Intelligence Information

Publications

BILLS-116s3905rs.pdf

Contact Information and Site Map

                                                      Calendar No. 477
116th Congress      }                                   {       Report
                                 SENATE
 2d Session         }                                   {      116-233

======================================================================



 
                  INTELLIGENCE AUTHORIZATION ACT FOR 
                            FISCAL YEAR 2021

                                _______
                                

                 June 17, 2020.--Ordered to be printed

                                _______
                                

         Mr. Rubio, from the Select Committee on Intelligence,
                        submitted the following

                              R E P O R T

                             together with

                             MINORITY VIEWS

                         [To accompany S. 3905]

    The Select Committee on Intelligence, having considered an 
original bill (S. 3905) to authorize appropriations for fiscal 
year 2021 for intelligence and intelligence-related activities 
of the United States Government, the Intelligence Community 
Management Account, and the Central Intelligence Agency 
Retirement and Disability System, and for other purposes, 
reports favorably thereon and recommends that the bill do pass.

               Classified Annexes to the Committee Report

    Pursuant to Section 364 of the Intelligence Authorization 
Act for Fiscal Year 2010 (Public Law 111-259), the Director of 
National Intelligence (DNI) publicly disclosed on February 11, 
2020, that the request for the National Intelligence Program 
(NIP) for Fiscal Year 2021 was $61.9 billion. Other than for 
limited unclassified appropriations, primarily the Intelligence 
Community Management Account, the classified nature of United 
States intelligence activities precludes any further 
disclosure, including by the Committee, of the details of its 
budgetary recommendations. Accordingly, the Committee has 
prepared a classified annex to this report that contains a 
classified Schedule of Authorizations. The classified Schedule 
of Authorizations is incorporated by reference in the 
Intelligence Authorization Act and has the legal status of 
public law. The classified annex is made available to the 
Committees on Appropriations of the Senate and the House of 
Representatives and to the President. It is also available for 
review by any Member of the Senate subject to the provisions of 
Senate Resolution 400 of the 94th Congress (1976).

              Section-by-Section Analysis and Explanation

    The following is a section-by-section analysis and 
explanation of the Intelligence Authorization Act for Fiscal 
Year 2021 (the ``Act'') that was reported by the Committee.

                    TITLE I--INTELLIGENCE ACTIVITIES

Section 101. Authorization of appropriations

    Section 101 lists the United States Government departments, 
agencies, and other elements for which the Act authorizes 
appropriations for intelligence and intelligence-related 
activities for Fiscal Year 2021.

Section 102. Classified schedule of authorizations

    Section 102 provides that the details of the amounts 
authorized to be appropriated for intelligence and 
intelligence-related activities for Fiscal Year 2021 are 
contained in the classified Schedule of Authorizations and that 
the classified Schedule of Authorizations shall be made 
available to the Committees on Appropriations of the Senate and 
House of Representatives and to the President.

Section 103. Intelligence community management account

    Section 103 authorizes appropriations for the Intelligence 
Community Management Account (ICMA) of the ODNI for Fiscal Year 
2021.

 TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM

Section 201. Authorization of appropriations

    Section 201 authorizes appropriations for the CIA 
Retirement and Disability Fund for Fiscal Year 2021.

               TITLE III--INTELLIGENCE COMMUNITY MATTERS

           SUBTITLE A--GENERAL INTELLIGENCE COMMUNITY MATTERS

Section 301. Restriction on conduct of intelligence activities

    Section 301 provides that the authorization of 
appropriations by the Act shall not be deemed to constitute 
authority for the conduct of any intelligence activity that is 
not otherwise authorized by the Constitution or laws of the 
United States.

Section 302. Increase in employee compensation and benefits authorized 
        by law

    Section 302 provides that funds authorized to be 
appropriated by the Act for salary, pay, retirement, and other 
benefits for federal employees may be increased by such 
additional or supplemental amounts as may be necessary for 
increases in compensation or benefits authorized by law.

Section 303. Clarification of authorities and responsibilities of 
        National Manager for National Security Telecommunications and 
        Information Systems Security

    Section 303 permits the National Manager for National 
Security Telecommunications and Information Systems Security, 
as designated by National Security Directive 42 (NSD-42), to 
delegate NSD-42 authorities to a Deputy National Manager, 
without further delegation. Section 303 further reinforces the 
National Security Agency's (NSA's) mission regarding 
authorities and funding programs by ensuring that the National 
Manager--when carrying out NSD-42 authorities--may supervise, 
oversee, or execute (directly or indirectly) the Information 
Systems Security Program (ISSP), but shall not supervise, 
oversee, or execute any aspect of the National Intelligence 
Program (NIP) or Military Intelligence Program (MIP), except as 
necessary to supervise, oversee, or execute the ISSP. Section 
303 also provides that, upon such delegation of authority, the 
Deputy National Manager may supervise, oversee, or execute 
(directly or indirectly) the ISSP, but shall not supervise, 
oversee, or execute any aspect of the NIP or MIP, except as 
necessary to supervise, oversee, or execute the ISSP.

Section 304. Continuity of operations plans for certain elements of the 
        intelligence community in the case of a national emergency

    Section 304 requires the Directors of the Office of the 
Director of National Intelligence (ODNI), Central Intelligence 
Agency (CIA), National Reconnaissance Office (NRO), Defense 
Intelligence Agency (DIA), NSA, and National Geospatial-
Intelligence Agency (NGA) to establish continuity of operations 
plans for use in the case of certain national emergencies as 
defined in statute, and share those with the congressional 
intelligence committees within 7 days of a national emergency 
being declared. Furthermore, Section 304 requires these 
agencies to provide the committees with any updates to those 
plans as the conditions of the national emergency require.

Section 305. Application of Executive Schedule level III to positions 
        of Director of National Security Agency and Director of 
        National Reconnaissance Office

    Section 305 provides that the Director of the NRO and the 
Director of the NSA shall be designated as Level III on the 
Executive Schedule, the equivalent of an Under Secretary. The 
Committee recognizes that this provision does not affect the 
current Director of the NSA's military rank or pay. Section 305 
is intended to provide the Committee's view as to the 
Director's stature in the interagency; it is not intended to 
signal support for a civilian nominee. The Committee further 
clarifies that this provision shall apply to a successor 
civilian occupying the position of Director of the NRO.

Section 306. National Intelligence University

    Section 306 provides the National Intelligence University 
(NIU) with the authorities that the Department of Defense War 
Colleges have regarding faculty member hiring and compensation, 
and the acceptance of faculty research grants. Section 306 also 
sustains an independent, external board of visitors to provide 
oversight of the NIU.

Section 307. Requiring facilitation of establishment of Social Media 
        Data and Threat Analysis Center

    Section 307 provides a requirement regarding Section 5323 
of the National Defense Authorization Act for Fiscal Year 2020 
by requiring that the Social Media Data and Threat Analysis 
Center be established not later than 180 days after enhancement 
of this Act.

Section 308. Data collection on attrition in intelligence community

    Section 308 requires the DNI to set standards and issue an 
annual report on the reasons why different categories of 
Intelligence Community (IC) employees separate from service or 
applicants to IC positions withdraw from the hiring process 
after they have been issued a conditional offer of employment. 
Data on workforce attrition should include demographics, 
specialties, and length of service. Such reasons may include an 
alternative job opportunity, a loss of interest in joining the 
IC, or the length of time to complete the clearance process.

Section 309. Limitation on delegation of responsibility for program 
        management of information-sharing environment

    Section 309 stipulates that the President must delegate 
responsibilities under Section 1016(b) of the Intelligence 
Reform and Terrorism Prevention Act of 2004 to an official 
other than the ODNI on or after October 1, 2020.

Section 310. Improvements to provisions relating to intelligence 
        community information technology environment

    Section 310 streamlines current reporting requirements by 
requiring the Director of National Intelligence (DNI) to 
develop and maintain a long-term roadmap for the Intelligence 
Community Information Technology Environment (IC ITE). Section 
310 further requires the DNI to develop and maintain a business 
plan to implement the long-term IC ITE roadmap.

Section 311. Requirements and authorities for Director of the Central 
        Intelligence Agency to improve education in science, 
        technology, engineering, arts, and mathematics

    Section 311 ensures that the Director of the CIA has the 
legal authorities required to improve the skills in science, 
technology, engineering, arts, and mathematics (known as STEAM) 
necessary to meet long-term national security needs.

      SUBTITLE B--INSPECTOR GENERAL OF THE INTELLIGENCE COMMUNITY

Section 321. Prohibition against disclosure of whistleblower identity 
        as reprisal against whistleblower disclosure by employees and 
        contractors in the intelligence community

    Section 321 adds to prohibited personnel practices a 
knowing, willful or negligent disclosure that reveals an IC 
Whistleblower's identifying information without consent. 
Section 321 further provides an IC Whistleblower with a private 
right of action if such disclosure is taken as a reprisal 
against the IC Whistleblower for bringing a complaint.

Section 322. Clarification of standards regarding whistleblower 
        complaints and information of urgent concern received by 
        Inspector General of the Intelligence Community

    Section 322 clarifies the definition of ``urgent concern'' 
regarding whistleblower complaints and ensures that the 
Inspector General of the Intelligence Community (IC IG) has 
authority over determining whether a matter falls within the 
``urgent concern'' definition.

Section 323. Clarification regarding submittal of complaints and 
        information by whistleblowers in the intelligence community to 
        Congress

    Section 323 clarifies that IC Whistleblowers can give their 
complaints to the intelligence committees--as long as the 
complaint is provided to both Chairman and Vice Chairman or 
Ranking Member or designated nonpartisan staff--regardless of 
whether they are determined to be urgent concerns. Section 323 
further provides new security protocols in the instances where 
complaints include classified information.

Section 324. Limitation on sharing of intelligence community 
        whistleblower complaints with persons named in such complaints

    Section 324 prohibits Federal government agents and 
employees from sharing an IC Whistleblower complaint that has 
been submitted to an IC element's IG with a named subject of 
the complaint, unless the IC Whistleblower provides written 
consent or information sharing is required as part of the 
investigation. Section 324 further provides that any violation 
is subject to criminal fines and/or two-year imprisonment and 
requires notification to the congressional intelligence 
committees.

  SUBTITLE C--REPORTS AND ASSESSMENTS PERTAINING TO THE INTELLIGENCE 
                               COMMUNITY

Section 331. Assessment by the Comptroller General of the United States 
        on efforts of the Intelligence Community and the Department of 
        Defense to identify and mitigate risks posed to the 
        Intelligence Community and the Department of Defense by the use 
        of direct-to-consumer genetic testing by the Government of the 
        People's Republic of China

    Section 331 directs the Comptroller General to assess 
efforts in the IC and Department of Defense (DoD) to identify 
and mitigate the risks posed to the IC and DoD by direct-to-
consumer genetic testing by the Government of the People's 
Republic of China. Section 331 further requires the report to 
include key national security risks and vulnerabilities, an 
assessment of the IC's and DoD's identification and mitigation 
of such risks and vulnerabilities, and recommendations for the 
IC and DoD to improve identification and mitigation of such 
risks and vulnerabilities.

Section 332. Report on use by intelligence community of hiring 
        flexibilities and expedited human resources practices to assure 
        quality and diversity in the workforce of the intelligence 
        community

    Section 332 requires the DNI to submit a report describing 
how IC elements are exercising hiring flexibilities and 
expedited human resources practices afforded under 5 U.S.C. 
Sec. 3326 and related regulations, including the identification 
of any obstacles encountered by the IC in exercising such 
authorities.

Section 333. Report on signals intelligence priorities and requirements

    Section 333 requires the DNI to submit a report detailing 
signals intelligence priorities and requirements subject to 
Presidential Policy Directive-28 that stipulates ``why, 
whether, when, and how the United States conducts signals 
intelligence activities.'' This report shall be submitted in 
unclassified form, but may include a classified annex.

Section 334. Assessment of demand for student loan repayment program 
        benefit

    Section 334 requires the head of each IC element to 
calculate the number of personnel who qualify for a student 
loan repayment program benefit, and compare it to the number of 
personnel who apply for such a benefit. The information 
provided will include recommendations for how to optimize 
participation and enhance the effectiveness of the benefit as a 
retention tool, to identify any shortfall in funds or 
authorities needed to provide such benefit, and to include such 
materials with the budget request for Fiscal Year 2022.

Section 335. Assessment of intelligence community demand for child care

    Section 335 requires the DNI in coordination with the heads 
of other IC elements to provide a report that includes: a 
calculation of the total annual demand for child care by 
employees at NSA, NGA, DIA, NRO, CIA, and ODNI; an 
identification of any shortfalls between demand and the child 
care support by these IC elements; an assessment of options for 
addressing any such shortfall; an identification of the 
advantages, disadvantages, security requirements, and costs 
associated with each option; a plan to meet, within five years 
after the date of the report, the demand for childcare, and an 
assessment of specific considerations that impact the 
alternatives available to these IC elements.

Section 336. Open source intelligence strategies and plans for the 
        intelligence community

    Section 336 requires the DNI in coordination with the heads 
of each IC element, to conduct a survey of the open source 
intelligence requirements, goals, investments, and capabilities 
for each element of the IC and to evaluate the usability of the 
Open Source Enterprise (OSE). Based on such findings, it 
further mandates the DNI shall develop, in coordination with 
the heads of each IC element, a strategy for open source 
intelligence collection, analysis, and production across the 
IC; create a plan for improving usability of the OSE; and 
conduct a risk and benefit analysis of creating an independent 
open source center.
    Using the findings above, Section 336 further requires the 
DNI to develop a plan for a centralized data repository of open 
source intelligence. Finally, it mandates the DNI develop a 
cost-sharing model that leverages the open source intelligence 
investments of each IC element for the beneficial use of the 
entire IC. It also requires the heads of ODNI, CIA, DIA, NGA, 
and NSA to jointly brief the congressional intelligence 
committees on the progress developing the aforementioned plans.

Section 337. Plan for establishing an element of the intelligence 
        community within the United States Space Force

    Section 337 requires the DNI and the Under Secretary of 
Defense for Intelligence and Security, in coordination with the 
Secretary of the Air Force and the Chief of Space Operations, 
to submit a plan for establishing an element of the IC within 
the United States Space Force.

          TITLE IV--SECURITY CLEARANCES AND TRUSTED WORKFORCE

Section 401. Exclusivity, consistency, and transparency in security 
        clearance procedures, and right to appeal

    Section 401 requires the Executive Branch to publish 
adjudicative guidelines for determining eligibility to access 
classified information and makes these guidelines the exclusive 
basis for granting, denying, and revoking clearances in order 
to increase transparency and accountability, and ensure due 
process. Section 401 further codifies the right of government 
employees to appeal unfavorable eligibility determinations to 
an agency-level panel. Section 401 also creates a higher level 
review by a government-wide appeals panel, chaired by the DNI 
as the government's Security Executive Agent, to review certain 
agency-level panel determinations involving allegations of 
constitutional violations or discrimination. This DNI-led panel 
can remand decisions to the employing agency for reevaluation 
if the panel finds valid cause.

Section 402. Establishing process parity for security clearance 
        revocations

    Section 402 requires an agency, in justifying an adverse 
security clearance or access determination against a 
whistleblower, to demonstrate by clear and convincing evidence 
that the agency would have made the same security clearance or 
access determination in the absence of the whistleblower's 
disclosure. Section 402 establishes parity in the legal 
standards applied to IC Whistleblower matters.

Section 403. Federal policy on sharing of derogatory information 
        pertaining to contractor employees in the trusted workforce

    Section 403 requires the DNI to issue a policy within 180 
days of enactment that facilitates sharing of derogatory 
information the government obtains on cleared contractors 
(along with any mitigation measures put in place) with Federal 
contractor employers' chief security officers, to help 
companies maintain robust insider threat programs. The policy 
must comport with privacy rights, allow individuals to verify 
the information, and stipulate that such sharing is only for 
purposes of security risk mitigation.

                   TITLE V--REPORTS AND OTHER MATTERS

Section 501. Secure and trusted technology

    Section 501 establishes a Communications Technology 
Security and Innovation Fund to support the development and 
deployment of open standards-based compatible, interoperable 
equipment for fifth-generation wireless networks to create a 
more secure and diverse telecommunications vendor market. It 
also establishes a Multilateral Telecommunications Security 
Fund to support the adoption of secure and trusted 
communications technologies in key markets globally. Section 
501 authorizes up to $750,000,000 for each fund and requires 
the administrators of each fund to provide annual reports to 
Congress detailing the use of proceeds.
    Section 501 further requires the DNI to submit a report on 
political influence by adversarial nations within international 
forums that set standards for fifth-generation and future 
generations of wireless networks, including International 
Telecommunication Union (ITU), International Organization for 
Standardization (ISO), Inter-American Telecommunication 
Commission (CITEL), and 3rd Generation Partnership Project 
(3GPP). Section 501 also requires the DNI and Secretary of 
Defense to jointly submit a report on developing federal 
wireless network testbeds for development of fifth-generation 
technologies for U.S. military and dual-use applications using 
open interface standards-based compatible, interoperable 
equipment. This report should include an assessment of efforts 
by foreign governments to build wireless network testbeds for 
virtualized telecommunication technologies. Both reports shall 
be in unclassified form with a classified annex, if required.

Section 502. Report on attempts by foreign adversaries to build 
        telecommunications and cybersecurity equipment and services 
        for, or to provide such equipment and services to, certain 
        allies of the United States

    Section 502 requires the CIA, NSA, and DIA to submit to the 
congressional intelligence and armed services committees a 
joint report that describes the United States intelligence 
sharing and military posture in Five Eyes countries that 
currently have or intend to use adversary telecommunications or 
cybersecurity equipment, especially as provided by China or 
Russia, with a description of potential vulnerabilities of that 
information and assessment of mitigation options.

Section 503. Report on threats posed by use by foreign governments and 
        entities of commercially available cyber intrusion and 
        surveillance technology

    Section 503 requires the DNI to submit a report to the 
congressional intelligence committees on the threats posed by 
foreign governments and foreign entities using and 
appropriating commercially available cyber intrusion and other 
surveillance technology.

Section 504. Reports on recommendation of the Cyberspace Solarium 
        Commission

    Section 504 requires the ODNI, Department of Homeland 
Security (acting through the Under Secretary of Homeland 
Security for Intelligence and Analysis), Department of Energy 
(acting through the Director of Intelligence and 
Counterintelligence of the Department of Energy), Department of 
Commerce, and DoD to report to Congress their assessment of the 
recommendations submitted by the Cyberspace Solarium Commission 
pursuant to Section 1652(j) of the John S. McCain National 
Defense Authorization Act (NDAA) for Fiscal Year 2019, and to 
describe actions that each agency expects to take to implement 
these recommendations.

Section 505. Assessment of critical technology trends relating to 
        artificial intelligence, microchips, and semiconductors and 
        related supply chains

    Section 505 requires the DNI to complete an assessment of 
export controls related to artificial intelligence (AI), 
microchips, advanced manufacturing equipment, and other AI-
enabled technologies, including the identification of 
opportunities for further cooperation with international 
partners.

Section 506. Duty to report counterintelligence threats to campaigns

    Section 506 requires that Federal presidential campaigns 
must report to the Federal Bureau of Investigation (FBI) within 
one week any offers to contribute, donate, expend, disburse, or 
solicit as prohibited under 50 U.S.C. Sec. 30121 by the 
following individuals: a foreign principal as defined in the 
Foreign Agent Registration Act; a person acting at the 
direction of a foreign principal; or a person included in the 
list of specially designated nationals or blocked person by the 
Treasury Department's Office of Foreign Asset Control. Section 
506 further requires Federal campaigns to establish a policy to 
retain and preserve records related to reportable foreign 
contacts for not less than three years, and enacts criminal 
penalties for willful violations of this section.

Section 507. Combating Chinese influence operations in the United 
        States and strengthening civil liberties protections

    Section 507 provides additional requirements to annual 
reports in 50 U.S.C. Sec.  3237(B) on Influence Operations and 
Campaigns in the United States by the Chinese Communist Party 
(CCP) by mandating an identification of influence operations by 
the CCP against the science and technology sector in the United 
States. Section 507 also requires the FBI to create a plan, in 
consultation with stakeholders outside the Intelligence 
Community to increase public awareness and detection of 
influence activities by the CCP. Finally, Section 507 requires 
the FBI, in consultation with the Assistant Attorney General 
for the Civil Rights and the Chief Privacy and Civil Liberties 
Officer of the Department of Justice, to develop 
recommendations to strengthen relationships with communities 
targeted by the CCP and to build trust with such communities 
through local and regional grassroots outreach.

Section 508. Annual report on corrupt activities of senior officials of 
        the Chinese Communist Party

    Section 508 requires the CIA, in coordination with the 
Department of Treasury's Office of Intelligence and Analysis 
and the FBI, to submit to designated congressional committees 
annually through 2025 a report that describes and assesses the 
wealth and corruption of senior officials of the Chinese 
Communist Party (CCP), as well as targeted financial measures, 
including potential targets for sanctions designation. Section 
508 further expresses the Sense of Congress that the United 
States should undertake every effort and pursue every 
opportunity to expose the corruption and illicit practices of 
senior officials of the CCP, including President Xi Jinping.

Section 509. Report on corrupt activities of Russian and other Eastern 
        European oligarchs

    Section 509 requires the CIA, in coordination with the 
Department of the Treasury's Office of Intelligence and 
Analysis and the FBI, to submit to designated congressional 
committees and the Under Secretary of State for Public 
Diplomacy, a report that describes the corruption and corrupt 
or illegal activities among Russian and other Eastern European 
oligarchs who support the Russian government and Russian 
President Vladimir Putin, and the impact of those activities on 
the economy and citizens of Russia. Section 509 further 
requires the CIA, in coordination with the Department of 
Treasury's Office of Intelligence and Analysis, to describe 
potential sanctions that could be imposed for such activities.

Section 510. Report on biosecurity risk and disinformation by the 
        Chinese Communist Party and the Government of the People's 
        Republic of China

    Section 510 requires the DNI to submit to the designated 
congressional committees a report identifying whether and how 
CCP officials and the Government of the People's Republic of 
China may have sought to suppress or exploit for national 
advantage information regarding the novel coronavirus pandemic, 
including specific related assessments. Section 510 further 
provides that the report shall be submitted in unclassified 
form, but may have a classified annex.

Section 511. Report on effect of lifting of United Nations arms embargo 
        on Islamic Republic of Iran

    Section 511 requires the DIA to submit to designated 
congressional committees a report on the Government of the 
Islamic Republic of Iran's plans to acquire military arms if 
the United Nations Security Council's resolutions' ban on arms 
transfers to or from the Government of the Islamic Republic of 
Iran is lifted, as well as the effects such arms acquisitions 
may have on regional security and stability.

Section 512. Report on Iranian activities relating to nuclear 
        nonproliferation

    Section 512 directs the DNI to submit a report on any 
relevant activities relating to nuclear weapons research and 
development by the Islamic Republic of Iran and any relevant 
efforts to afford or deny international access to related 
facilities in accordance with international non-proliferation 
agreements.

Section 513. Sense of Congress on Third Option Foundation

    Section 513 expresses the sense of Congress that the Third 
Option Foundation's work on behalf of the CIA's special 
operations community and their families is invaluable, such 
that the Director of the CIA should work with the Foundation to 
implement section 6412 of the Damon Paul Nelson and Matthew 
Young Pollard Intelligence Authorization Act for Fiscal Years 
2018, 2019, and 2020, which provided special rules for certain 
monthly workers' compensation payments and other payments to 
CIA personnel.

                           Committee Comments


Equitable Treatment of Relocation Costs for Intelligence Community 
        Civilians

    As demonstrated in The Intelligence Community Workforce 
Agility Protection Act of 2020, S. 3675, introduced by Senators 
Burr and Warner, the Committee strongly supports IC personnel 
who must make a permanent change of station to accept an IC 
position. The Committee recognizes such relocations pose 
significant financial hardships for the IC civilians who move 
their families to serve their country. Current law provides 
military members with exemptions from effective tax penalties 
for such relocations, but IC civilians have no similar 
exemptions, thus undermining the IC's ability to recruit and 
maintain a highly qualified and motivated workforce. The 
Intelligence Community Workforce Agility Protection Act of 2020 
would provide equitable tax treatment for IC civilians who are 
subject to similar permanent change of station orders. The 
Committee looks forward to expeditious congressional action on 
this matter.

Advanced Aerial Threats

    The Committee supports the efforts of the Unidentified 
Aerial Phenomenon Task Force at the Office of Naval 
Intelligence to standardize collection and reporting on 
unidentified aerial phenomenon, any links they have to 
adversarial foreign governments, and the threat they pose to 
U.S. military assets and installations. However, the Committee 
remains concerned that there is no unified, comprehensive 
process within the Federal Government for collecting and 
analyzing intelligence on unidentified aerial phenomena, 
despite the potential threat. The Committee understands that 
the relevant intelligence may be sensitive; nevertheless, the 
Committee finds that the information sharing and coordination 
across the Intelligence Community has been inconsistent, and 
this issue has lacked attention from senior leaders.
    Therefore, the Committee directs the DNI, in consultation 
with the Secretary of Defense and the heads of such other 
agencies as the Director and Secretary jointly consider 
relevant, to submit a report within 180 days of the date of 
enactment of the Act, to the congressional intelligence and 
armed services committees on unidentified aerial phenomena 
(also known as ``anomalous aerial vehicles''), including 
observed airborne objects that have not been identified.
    The Committee further directs the report to include:
          1. A detailed analysis of unidentified aerial 
        phenomena data and intelligence reporting collected or 
        held by the Office of Naval Intelligence, including 
        data and intelligence reporting held by the 
        Unidentified Aerial Phenomena Task Force;
          2. A detailed analysis of unidentified phenomena data 
        collected by:
            a. geospatial intelligence;
            b. signals intelligence;
            c. human intelligence; and
            d. measurement and signals intelligence;
          3. A detailed analysis of data of the FBI, which was 
        derived from investigations of intrusions of 
        unidentified aerial phenomena data over restricted 
        United States airspace;
          4. A detailed description of an interagency process 
        for ensuring timely data collection and centralized 
        analysis of all unidentified aerial phenomena reporting 
        for the Federal Government, regardless of which service 
        or agency acquired the information;
          5. Identification of an official accountable for the 
        process described in paragraph 4;
          6. Identification of potential aerospace or other 
        threats posed by the unidentified aerial phenomena to 
        national security, and an assessment of whether this 
        unidentified aerial phenomena activity may be 
        attributed to one or more foreign adversaries;
          7. Identification of any incidents or patterns that 
        indicate a potential adversary may have achieved 
        breakthrough aerospace capabilities that could put 
        United States strategic or conventional forces at risk; 
        and
          8. Recommendations regarding increased collection of 
        data, enhanced research and development, and additional 
        funding and other resources.
    The report shall be submitted in unclassified form, but may 
include a classified annex.

Coordination of Security for Domestic Military Installations and Other 
        Facilities

    The Committee is concerned that, as a result of several 
recent incidents of attempted unauthorized access to Naval Air 
Station Key West and Fort Story, Virginia by Chinese nationals, 
several security vulnerabilities have been discovered. Foreign 
adversaries may be systematically probing military 
installations and facilities, and it is important that the 
Department of Defense take responsibility for ensuring security 
measures are adequate, unauthorized accesses are tracked, and 
uniform reporting requirements for attempted unauthorized 
accesses are established.
    Therefore, the Committee directs the Under Secretary of 
Defense for Intelligence and Security (USD(I&S)), in 
coordination with the DNI and the Director of the FBI, to 
establish within the Office of the USD(I&S) a designee 
responsible for coordination of security for domestic military 
installations and other domestic military facilities. 
Specifically, the designee's responsibilities shall include 
tracking unauthorized incursions into domestic military 
installations and facilities and attempts at such incursions.
    The Committee further directs that, within 180 days of 
enactment of this Act, such individual shall develop a strategy 
for security and counterintelligence collection that defines 
the capability requirements, responsibilities, and processes 
for security and counterintelligence for domestic military 
installations and other domestic military facilities. In 
addition, not less frequently than once each year, the Under 
Secretary shall, in consultation with the heads of other 
appropriate elements of the DoD and the IC, brief the 
intelligence and armed services committees on the:
          1. Activities of the designee; and
          2. Current and anticipated trends and developments in 
        connection with security for domestic military 
        installations and other domestic military facilities.

Processing, Exploitation, and Dissemination Modernization and 
        Integration Efforts of the Algorithmic Warfare Cross-functional 
        Team of the Department of Defense

    The Committee is concerned with the intelligence silos that 
have resulted from isolated procurement programs that store 
data in individual repositories, each with its own set of 
cataloging procedures and proprietary technologies. This, in 
turn, potentially limits advantageous communications among 
databases, causes vital intelligence to go undetected, and 
causes duplication of separately-located analysts' efforts in 
reviewing other, less vital, intelligence information.
    Therefore, the Committee directs the head of the 
Algorithmic Warfare Cross-Functional Team, as established in 
the Department of Defense by memorandum dated April 26, 2017, 
to submit to the congressional intelligence and armed services 
committees within 180 days of enactment of the Act, a report 
that includes:
          1. Recommendations for the delineation of efforts 
        between the Team and the Joint Artificial Intelligence 
        Center, especially with respect to data labeling, 
        testing and evaluation;
          2. Recommendations for resource sharing across the 
        intelligence community for test and evaluation as 
        Project Maven transitions its independent lines of 
        effort;
          3. The plan of the Team to integrate unsupervised 
        artificial intelligence algorithms (e.g., algorithms 
        that learn from data without being trained, allowing 
        the artificial intelligence to self-improve) into 
        Project Maven;
          4. The plan of the Team to incorporate independent 
        data repositories located across the intelligence 
        community, irrespective of the element providing the 
        data or the domain they are resident to, into Project 
        Maven; and
          5. The plan of the Team to ensure that development of 
        Processing, Exploitation, and Dissemination technology 
        that will facilitate and enhance the capability of 
        analysts to rapidly search across near real-time 
        sensors, leverage historical data, and identify 
        valuable intelligence is incorporated into the Defense 
        Intelligence Agency Machine-assisted Analytic Rapid-
        repository System.

Plan for Assessing Government Agency Counterintelligence Programs

    Adversary intelligence and security service efforts to 
monitor, access, penetrate, and/or manipulate government 
facilities, personnel, networks, and supply chains have become 
increasingly more sophisticated, as described in the National 
Counterintelligence Strategy of the United States. Many 
national security agencies, to include those in the DoD and IC, 
have mature and robust counterintelligence programs to preserve 
the integrity of their systems. However, many agencies' 
programs lag behind, either because they do not believe they 
are at risk or because of internal funding challenges. 
Therefore, the Committee directs the Director of the National 
Counterintelligence and Security Center to develop a plan 
within 90 days of enactment of this Act for assessing the 
effectiveness of all government agency counterintelligence 
programs. This plan should address the standards and methods of 
assessment that may apply for different categories of executive 
agencies; phasing of implementation over a five-year timeframe 
to cover all government counterintelligence; the periodicity 
for updated assessments; and annual costs to conduct these 
assessment and any recommendation for a cost recovery 
mechanism.

Security Clearance Procedures and Rights to Appeal

    Section 401 of the Act provides appeal rights and 
procedures for security clearance eligibility determinations. 
This provision is not intended to impede agency decisions 
regarding access to classified information for a limited 
purpose or duration (e.g., regarding an election or one-time 
read-ins for a specific event or threat). The Committee does, 
however, expect agencies to keep Congress fully and currently 
informed of any limited purpose or duration grants of access. 
Finally, the Committee expects the DNI-level appeals panel to 
exercise judgment and review only those appeals that the panel 
concludes have evidentiary and jurisdictional merit.

Supporting Industry during Coronavirus

    Congress passed the Coronavirus Aid, Relief, and Economic 
Security Act (CARES Act) in March 2020 to provide necessary 
assistance to the American economy during the coronavirus 
pandemic. An important element of that Act was Section 3610, 
which provided agencies authorities to modify contracts for 
companies supporting the government. This provision was 
critical to the defense industrial base. The Committee believes 
that consistent interpretation of Section 3610, particularly as 
it relates to work conducted at contractor facilities, cost 
reimbursement methodology, adjustments in payment plans, and 
adjustments in contract periods of performance, is essential to 
reducing uncertainty and sustaining a vibrant national security 
sector. The Committee looks forward to working with the IC 
elements in identifying if any additional authorities or 
resources are necessary and identifying lessons learned for any 
future national emergency.

Efficient Use of Sensitive Compartmented Information Facilities

    The Committee is concerned that there are unnecessary 
challenges to the utilization of Sensitive Compartmented 
Information Facility (SCIF) spaces by multiple programs among 
IC and Department of Defense components and their appropriately 
cleared government contractors. These challenges result in 
inefficient use of SCIFs and classified networks. The Committee 
finds that it is important to support collaboration and related 
efficiencies by sharing SCIF spaces.
    Therefore, the Committee directs the DNI, in consultation 
with the Secretary of Defense, to issue, within 180 days after 
enactment of this Act, revised guidance authorizing and 
directing government agencies and their appropriately cleared 
contractors to process, store, use, and discuss sensitive 
compartmented information (SCI) at facilities previously 
approved to handle SCI, without need for further approval by 
agency or by site. This guidance shall apply to both IC-
controlled access programs and DoD special access programs.

                            Committee Action

    On June 3, 2020, a quorum being present, the Committee met 
to consider the bill and amendments. The Committee took the 
following actions:

Votes on amendments to the committee bill and the classified annex

    By unanimous consent, the Committee made the Acting 
Chairman and Vice Chairman's bill, together with the classified 
annex for Fiscal Year 2021, the base text for purposes of 
amendment.
    By voice vote, the Committee adopted en bloc three 
amendments to the classified annex, as follows: (1) a second-
degree amendment by Acting Chairman Rubio; (2) an amendment by 
Acting Chairman Rubio; and (3) a second-degree amendment by 
Senator Sasse.
    By voice vote, the Committee adopted en bloc five 
amendments to the bill, as follows: (1) an amendment by Senator 
Burr and cosponsored by Vice Chairman Warner, to improve 
provisions relating to the IC Information Technology 
Environment; (2) an amendment by Senator Risch and cosponsored 
by Senator King, to require reporting on Cyberspace Solarium 
Commission recommendations; (3) a second-degree amendment by 
Acting Chairman Rubio and cosponsored by Senators Risch, Blunt, 
Cotton, Cornyn, and Sasse, to improve Section 322; (4) an 
amendment by Senator Bennet and cosponsored by Vice Chairman 
Warner and Senators Cotton and Cornyn, to require an assessment 
of critical technology trends related to artificial 
intelligence; and (5) an amendment by Senator Cotton to require 
a report on Iranian activities relating to nuclear 
nonproliferation.
    By voice vote, the Committee adopted an amendment by 
Senator Burr and cosponsored by Vice Chairman Warner, which 
provides the legal authorities required for the Director of the 
CIA to improve recruitment in the areas of science, technology, 
engineering, arts, and mathematics (known as STEAM) necessary 
to meet long-term national security needs.
    By voice vote, the Committee adopted a second-degree 
amendment by Vice Chairman Warner and cosponsored by Senators 
Collins and Bennet, to an amendment by Vice Chairman Warner, 
and cosponsored by Senators Collins and Bennet, that requires 
Federal presidential campaigns to report to the FBI illegal 
offers of assistance by known foreign agents. The second-degree 
amendment exempted unpaid volunteers from such reporting 
requirements and reduced the criminal penalties. By a vote of 8 
ayes and 7 noes, the Committee adopted the amendment by Vice 
Chairman Warner, and cosponsored by Senators Collins and 
Bennet, as modified by the second-degree amendment. The votes 
in person were as follows: Acting Chairman Rubio--no; Senator 
Burr--no; Senator Risch--no; Senator Collins--aye; Senator 
Blunt--no; Senator Cotton--no; Senator Cornyn--no; Senator 
Sasse--no; Vice Chairman Warner--aye; Senator Feinstein--aye; 
Senator Wyden--aye; Senator Heinrich--aye; Senator King--aye; 
Senator Harris--aye; and Senator Bennet--aye.
    By a vote of 7 ayes and 8 noes, the Committee did not adopt 
an amendment by Senator Wyden to establish the DNI as the 
Executive Agent for Federal government-wide declassification 
processes and requirements. The votes in person were as 
follows: Acting Chairman Rubio--no; Senator Burr--no; Senator 
Risch--no; Senator Collins--no; Senator Blunt--no; Senator 
Cotton--no; Senator Cornyn--no; Senator Sasse--no; Vice 
Chairman Warner--aye; Senator Feinstein--aye; Senator Wyden--
aye; Senator Heinrich--aye; Senator King--aye; Senator Harris--
aye; and Senator Bennet--aye.

Votes to report the committee bill

    On June 3, 2020, the Committee voted to report the bill, as 
amended, by a vote of 14 ayes and one no. The votes in person 
or by proxy were as follows: Acting Chairman Rubio--aye; 
Senator Burr--aye; Senator Risch--aye; Senator Collins--aye; 
Senator Blunt--aye; Senator Cotton--aye; Senator Cornyn--aye; 
Senator Sasse--aye; Vice Chairman Warner--aye; Senator 
Feinstein--aye; Senator Wyden--no; Senator Heinrich--aye; 
Senator King--aye; Senator Harris--aye; and Senator Bennet--
aye.
    By unanimous consent, the Committee authorized the staff to 
make technical and conforming changes to the bill and 
classified annex.

                       Compliance With Rule XLIV

    Rule XLIV of the Standing Rules of the Senate requires 
publication of a list of any ``congressionally directed 
spending item, limited tax benefit, and limited tariff 
benefit'' that is included in the bill or the committee report 
accompanying the bill. Consistent with the determination of the 
Committee not to create any congressionally directed spending 
items or earmarks, none have been included in the bill, the 
report to accompany it, or the classified schedule of 
authorizations. The bill, report, and classified schedule of 
authorizations also contain no limited tax benefits or limited 
tariff benefits.

                           Estimate of Costs

    Pursuant to paragraph 11(a)(3) of rule XXVI of the Standing 
Rules of the Senate, the Committee deems it impractical to 
include an estimate of the costs incurred in carrying out the 
provisions of this report due to the classified nature of the 
operations conducted pursuant to this legislation. On June 8, 
2020, the Committee transmitted this bill to the Congressional 
Budget Office and requested an estimate of the costs incurred 
in carrying out the unclassified provisions.

                    Evaluation of Regulatory Impact

    In accordance with paragraph 11(b) of rule XXVI of the 
Standing Rules of the Senate, the Committee finds that no 
substantial regulatory impact will be incurred by implementing 
the provisions of this legislation.

                        Changes to Existing Law

    In compliance with paragraph 12 of rule XXVI of the 
Standing Rules of the Senate, the Committee finds that it is 
necessary to dispense with the requirement of paragraph 12 to 
expedite the business of the Senate.

                    MINORITY VIEWS OF SENATOR WYDEN

    Despite its strong provisions, I voted against the Fiscal 
Year 2021 Intelligence Authorization Act because the 
legislation failed to reform a broken, costly declassification 
system. Years of reports, from the Information Security 
Oversight Office (ISOO) and the Public Interest 
Declassification Board (PIDB), have documented how a flood of 
digital classification has overwhelmed the federal government's 
obsolete declassification system. There is a consensus, inside 
and outside government, that the system is unsustainable.
    The ISOO has determined that the cost of classification 
continues to increase and now exceeds $18 billion annually. A 
dysfunctional system that lets more and more classified records 
pile up wastes a significant portion of that amount, while 
undermining transparency and doing nothing to protect national 
security.
    There is no dispute about the severity of the problem, nor 
about the solution--modernization of the declassification 
system. Senator Jerry Moran and I have introduced bipartisan 
legislation (S. 3733) to charge the Director of National 
Intelligence with modernizing declassification, a 
recommendation also made by the PIDB. I am disappointed that 
the Committee rejected efforts to adopt this commonsense 
bipartisan reform and address this ever-growing crisis.
    The bill includes a number of important Intelligence 
Community whistleblower protection provisions, four of which 
were included at the behest of Vice Chairman Warner and myself. 
Those provisions protect from outside interference the 
Inspector General's determinations about what whistleblower 
complaints to submit to Congress, prohibit the public 
disclosure of whistleblowers' identities, prohibit 
whistleblower complaints from being shared with the subjects of 
those complaints, and provide a channel for whistleblowers to 
come directly to Congress without interference from the DNI.
    Unnecessarily restrictive language was added to the 
provision facilitating direct whistleblower communications with 
Congress. The Intelligence Community Whistleblower Protection 
Act created a process for whistleblowers to communicate with 
the ``intelligence committees,'' whereas the bill appears to 
limit such communication to the Chairman and Vice Chairman, or 
certain nonpartisan staff. To the extent the bill creates new 
limitations on efforts by whistleblowers to convey concerns to 
members of Congress, the language in the bill should be 
modified or clarified.
    The bill includes a fifth whistleblower provision I 
proposed that protects whistleblowers whose security clearances 
are revoked or who face an adverse access determination by 
requiring that the government demonstrate by clear and 
convincing evidence that the agency would have made the same 
security clearance or access determination in the absence of 
the whistleblower's disclosure.
    It also includes my provision requiring a report on the 
threat posed by the proliferation of commercial spyware as well 
as U.S. government efforts to counter that threat.
    Finally, I am pleased that the Classified Annex requires a 
report with information that Senator Heinrich and I have been 
seeking related to collection conducted pursuant to Executive 
Order 12333.

                                                         Ron Wyden.

                                  [all]

211 Hart Senate Office Building
Washington, D.C. 20510
Phone: (202) 224-1700

Site Map

The World of AI!

https://www.youtube.com/watch?v=F2G6sI1B3hE&feature=youtu.be
Copyright, C, Steve Erdmann and Watcherstalk, 2018 
Permission to quote brief segments with credits for journalists and reviewers.

Another version of this article can be seen at :

The AI Truth Panel – – https://wordpresscom507.wordpress.com/2020/06/07/

https://www.youtube.com/watch?v=rYelEUVQ50ghttps://www.youtube.com/watch?v=rYelEUVQ50ghttps://www.youtube.com/watch?v=rYelEUVQ50ghttps://www.youtube.com/watch?v=rYelEUVQ50ghttps://www.youtube.com/watch?v=rYelEUVQ50ghttps://www.youtube.com/watch?v=rYelEUVQ50g
Westworld Theme Music

Photos Extra Westworld ( httpswww.inverse.comarticle23246-westworld-interactive-fiction-interviews ) maxresdefaultjpg
http://www.sulinformacao.pt/2017/03/a-serie-televisiva-westworld-e-a-inteligencia-artificial/
Photos Extra LSD-Smoke ( httpswww.thefix.comcloak-and-dropper-twisted-history-cia-and-lsdpage=all ) humantesting
https://eprnews.com/now-available-from-down-out-books-let-me-put-my-stories-in-you-a-collection-by-ryan-sayles-130063/
Photos Extra Panel 27994563_10156180830124595_744438543_n
(Tab or Click on the program Below)
https://www.youtube.com/watch?v=F2G6sI1B3hE&feature=youtu.behttps://www.youtube.com/watch?v=F2G6sI1B3hE&feature=youtu.behttps://www.youtube.com/watch?v=F2G6sI1B3hE&feature=youtu.behttps://www.youtube.com/watch?v=F2G6sI1B3hE&feature=youtu.be
https://www.youtube.com/watch?v=F2G6sI1B3hE&feature=youtu.be
https://m.facebook.com/story.php?story_fbid=2016977888624627&id=1563130164009404

Another version of this article can be send at:

The AI Truth Panel – – https://wordpresscom507.wordpress.com/2020/06/07/

Photos Extra Watchers 28168565_10155234862547703_7769337695049648963_n
 Comments, Biographies, Indexes, and Listings Concerning the Topic 

“The world of prophetic science-fiction has long ago taken place. Tesla was only a minute, a fragmentary glimpse. There has arisen a whole ‘science’ of investigators, such as John Hall and associates, Steve M. Greer (who has devoted a lot of time gathering whistle-blowers, and many incidents recounted over the years by reporters such as Glenn Greenwald and organizations such as Wikileaks, first-hand accounts, such as Edward Snowden, and on and on) who tell us (plus your own private research will to tell you as well, once its done) that an ‘increasing’ and ‘hidden’ world of psychotronics has been operating behind the scenes. I have written much on this lately at various sites on the Internet.  You are talking about Manipulators that are in Black Budgets — if they can even be called that — that deal in trillions of dollars and other War Chests.  It is a scary, frighteningly morose picture that many rather not face, as most are living in nice, pretty “boxes” with ribbons and flowery paper and images from kindergarten. Least of which is the speculation that somewhere along the line, probably earlier than we think, some type of alliance(s) had/have come about with extraterrestrial civilizations and our own national governments, which may not be entirely beneficial.  As culprit Errol Childress told detective Rustin Chole in TRUE DETECTIVE (and I am here referring to general attitudes of most citizens who refuse to see these basic manipulations of fellow humans):  “Take off your masks, little priests.” 
Stephen Erdmann, February 26, 2017, Facebook Timeline. Panelist.

Photos Extra War1 ( httpwww.allworldwars.comSovietWarPaintings.html ) SovietPictures067
“ Manipulators…That deal in trillions of dollars and other War Chests.  It is a scary, frighteningly morose picture that many rather not face.”
http://720p.9ads.mobi/video/watch-The-red-army-is-the-strongest-video/
*******.
“Did you read the fine print? Basically, Ancestry.com gets to use or distribute your DNA for any research or commercial purpose it decides and doesn’t have to pay you, or your heirs, a dime. Furthermore, Ancestry.com takes this royalty-free license in perpetuity (for all time) and can distribute the results of your DNA tests anywhere in the world and with any technology that exists, or will ever be invented. With this single contractual provision, customers are granting Ancestry.com the broadest possible rights to own and exploit their genetic information.” 
Travis Smith, Facebook Timeline, February 22, 2018, and also email March 3, 2018.  Manages  Readwipedand blew and  Elsgate on YouTube.

**********

Two Q-tip swabs are vertically positioned next to each other. Blurred in the background, there is a container filled with other q-tips.
Ancestry.com takes DNA ownership rights from customers and their relatives
A word to the wise: Read the complete terms of service. THINKPROGRESS.ORG.
***
Quote from the below article, Travis Smith:  “…want to believe in the good of humanity and this technology being developed for beneficial results.  However, should we rush blindly into the future in regards to AI / Quantum computing then we may want to pause and think about this warning: Your children will curse your name for an eternity if we allow them to get sucked up into a trans-humanist future where they become nothing but, immortal slaves connected to an AI hive mind. Think I am a bit over the top in this prediction.  Think again because I am not the only one warning of this.  The writing is on the walls. The breaks must be applied before we enter on this AI Superhighway of apocalyptic and dystopian proportions.  This ‘Machine Kingdom’ has been planned for a long time and some are becoming more and more skeptical of the ‘bread and circus’ of day to day politics…” 
http://www.readwipedandblew.com/2018/03/03/ai-superhighway-means-children/
*******.
Jonathan Compoa: “Everyone: Elon Musk is so smart, possibly the smartest entrepreneur in present-time, he has the best new ideas! Nothing can go wrong, it’s Elon Musk’s philosophy, he thinks humans will be worthless anyway! Let’s all sign up so that our minds can get hacked into his robotic world. Better yet, this should be used by the state to ID every citizen.  Awesome!  So glad to see the first steps and visions of mass Mind Control along with Mark Zuckerberg’s ‘mind-reading’ interface for Facebook.”

https://www.youtube.com/watch?v=H15uuDMqDK0
Tesla founder and CEO Elon Musk recently spoke about a very exciting topic, the idea of creating an interface connecting the human brain with computers.
https://www.washingtonpost.com/national/health-science/brain-computer-interfaces-are-coming-consensual-telepathy-anyone/2017/06/09/9345c682-46ef-11e7-98cd-af64b4fe2dfc_story.html?utm_term=.d2cd578c91d5
Jonathan Campoa continues:  “Speaking about Amazon, it has now purchased Ring, a home security company, which will become embedded with the Alexa-based devices.  Jeff Bezos owns Amazon, the Washington Post, and recently purchased Whole Foods Market.  All of this can be idolized, and it is expected from entrepreneurs like Bezos and Elon Musk.  There is nothing wrong with any of this, other than the idea that smart algorithms are already embedded within Amazon’s online commerce, its warehouses, its Alexa devices, which will eventually lead to home network systems. The minute AI is introduced to the multiple companies revolving around  Jeff Bezos, it will be able to manage all the important industries for human consumption (food, news, entertainment, home security, pharmaceuticals, etc). 
https://www.cnbc.com/2018/02/27/amazon-buys-ring-the-smart-door-bell-maker-it-backed-through-alexa-fund.html.
“Silicon Valley parents have already understood the dangers of these attention-seeking technologies and there is a slight shift into raising their children without these devices. Yet, even if the parents create a tech-free environment for the children at home, schools and societies are developing a need to use these technologies.  In an article on Business Insider, it is mentioned that Google Chromebooks were handed out to all students in the school district at the beginning of the year. This Chromebook will now be a device which facilitates the students work and access to online information, but likewise be a device which very likely monitors and records the student’s location and usage.
http://www.businessinsider.com/silicon-valley-parents-raising-their-kids-tech-free-red-flag-2018-2.
“I’ve come to realize that there is still a big group of people that are not aware of Sophia, the female AI robot.  This robot was activated by Hanson Robotics on April of 2015, then became a Saudi Arabian citizen in October of 2017, being the first robot to receive any type of citizenship.  Some concerns are raised when we consider that women still suffer from inequality in Saudi Arabia, yet a female robot is granted citizenship.  There have also been rumors about why Saudi Arabia would grant a female robot citizenship, such as the claim that as a citizen, she would be able to work for an income and pay taxes. As cryptocurrencies are expanding and we seem to be shifting to a more digitized monetary system, Sophia, as an AI system connected to the Cloud, would be able to disrupt the industry and develop much more economic strategies than any human mind can create. Interestingly enough, the robot is named Sophia, referencing the Divine Sophia or feminine personification of wisdom, and the Descent of Sophia corresponds to the Birth of Mary and our own fall into matter, as written by Rev. Steven Marshall in attached link.  In this case, I believe it crucial to not fall into some idolization of this robot. There is a silent film from Germany, named Metropolis, in which a female robot is built to impersonate a woman named María (Mary).
http://gnosis.org/ecclesia/homily_Descent.htm
“We should strongly divert from fear-based predictions and mentalities when it comes to the advancements of AI and technology, because there are a lot of beneficial outcomes through all of this, such as a reconstructed economic system where we won’t have unnecessary jobs, having to work through repetitive and futile tasks.  We are decades, if not at least 100 years, behind in technology and societal conditions, so the many industries and jobs are already obsolete. In this scenario, we can utilize AI technology to progress into the new paradigm.  Even though I see the benefits of AI technology, I strongly believe that AI systems is not to be integrated into the human body or mind. The human body is sufficient enough as a vehicle for ascension, and although updating body features and properties sounds attractive in terms of having an improved vehicle, I don’t think the Creator’s organic design is to have meddled with inorganic devices. “
https://www.youtube.com/watch?v=GcMXQZ69lSI
Jonathan Campoa, April 28, 2017, on Facebook, and also submission by email, March 4, 2018. University of California, Riverside.  Manages Portal to Ascension.  Panelist.
Image may contain: 1 person
Image may contain: 3 people, including Jonathan Campoa
Neil Gaur, top, and Jonathan Compoa, right, top..
*******
“It is important to navigate these times and the mass implementation of AI in a conscious manner. Utilizing conscientiousness and being aware of the impact this can have on a global level will allow us to ensure we steer technology in a way that benefits humanity rather than controls or manipulates. The powers that be want to control…it is up to us to awaken the masses before this happens.”
Neil Gaur, Coordinator and Panelist, March 3, 2018, and Facilitator of awareness and consciousness expansion and also Founder & Executive Director at Portal to Ascension. Panelist.
*******
“Stuart Russell ends his piece in Nature with a plea: ‘The AI and robotics science communities, represented by their professional societies, are obliged to take a position, just as physicists have done on the use of nuclear weapons, chemists on the use of chemical agents and biologists on the use of disease agents in warfare.  Debates should be organized at scientific meetings; arguments studied by ethics committees; position papers written for society publications, and votes taken by society members.  Doing nothing is a vote in favor of continued development and deployment.’  This applies to all of us, right now. Doing nothing, reading nothing about it, taking an easy, lazy line, makes you culpable. Alarmingly, future generations depend on us.”
Stuart Russell, Professor of Computer Sciences, University of California, Berkley.
https://life.spectator.co.uk/2017/09/we-cannot-afford-to-sit-back-and-watch-robot-wars-are-something-to-fear/

Photos Extra Group of Robots 35816889-ultron-wallpaper
“Alarmingly, future generations depend on us.”
http://pixcooler.com/avengers+2+age+of+ultron+images
*******
“We introduced the concept of  ‘symbiotic autonomy’ to enable robots to ask for help from humans or from the Internet. Now, robots and humans in our building aid one another in overcoming the limitations of each other.”
Manuela Veloso  –  Professor of computer science, Carnegie Mellon University.
https://www.nature.com/news/robotics-ethics-of-artificial-intelligence-1.17611
*********

Photos Extra One Robot ( httpwallscollection.neta-fblack-wallpapers.html ) Black-Wallpapers-in-HQ-Resolution
https://picturefordesktop.com/iron-man-black-and-white-wallpaper/

“Knowledge is power and these talks are how the power can get into our hands, rather than the Puppet-Masters. The Quantum Adiabatic computers are here, and what these sociopath-madmen are doing at Kendra Corp, CERN, and many other places where ‘your’ hard-earned money is paying for these ‘far from transparent programs.’
“If we aren’t aware of what is going on, we have no power to change. We can make change and this is a ‘Truth Movement’ that  is arming us with understanding.  If you never know what the opposition is and what is happening, then they are unopposed.  The latest discoveries and bizarre artifacts that are proving man’s history is much older than the accepted version taught in schools (these images under these megaliths like Chichen Itza, Angkor Wat, Antarctica, Guatemala, and also a massive underground complex ‘under’ the Giza plateau that again ‘dwarfs’ what is above ground).
“LAWS could violate fundamental principles of human dignity by allowing machines to choose whom to kill — for example, they might be tasked to eliminate anyone exhibiting ‘threatening behavior.’  The potential for LAWS technologies to bleed over into peacetime policing functions is evident to human-rights organizations and drone manufacturers.
“I believe ancient tech has been found in mysterious places. Our top scientific findings are beginning to sound more as a religion with emerging vistas, as they open gateways, communicating with unknowns, and,  like Frankenstein, are attempting to create gods:  By their terrible actions, they are trying to become gods (Google search highlighting Dr. Richard Seed and Geordie Rose).
“Our ‘smartest’ people outside these programs are warning us, but you won’t find that huge message in the news!  You only hear about tweets and fake conflicts to distracts us.  Free your mind and empower yourself.  Join us! We want to get the truth seekers information they can understand and to be conscious of what’s is going on. We are Society and we are watching.”
*******
“Becoming a God or Creating One:
“We live in a time that could be the next Golden Age of Man or age of extinction.  We live in a time where we only ask can we and not should we. After tests like the first nuclear blast, that they thought would destroy all of New Mexico or tear a hole in space…on Earth. Now unlimited funding is thrown at individuals and corporations with no oversight whatsoever. The military-Industrial-Complex has become compartmentalized, and they are using private corporations to further hidden agendas.  Maybe we should stop just for a day and look at what we are doing in thousands of private labs that we pay for worldwide (some that don’t even have a security guard or locked doors), they are so secure and hidden away.  In the grand scheme of things, if the ‘human being‘ so chose to, he could look around and, instead, endeavor to create inventions to benefit and save everyone on the planet.  Imagine if we put as much into making people healthy as we do into being better killers with better tools. It’s definitely easier to kill a million people and control them rather to ‘heal‘ a million.
“Recently D-Wave at Kendra Corporation (Search the Internet for Geordie Rose has asked for our help.  Posting the code or making it “Open Source” is a two-pronged fork being stuck in our backs. On one hand, they act like they are posting this so it’s avail-able free for all mankind. This also gives the illusion of transparency.
Monstrous Scientific Projects
“These culprits have the technology but not the moral fortitude to go with it.  Gordie Rose and people like Dr. Richard Seed of CERN and the Center of European Nuclear Research, saying things like, if I may paraphrase:  ‘We will all become as gods, nothing will stop us from accomplishing that goal, not even having a war.’  We are talking here of monstrous scientific projects done in secret and behind our backs.” 

Photos Extra Three Robots ( httpsimgur.comgalleryXCvrL ) 2hhiJrP
https://www.halowaypoint.com/en-US/games/halo-5-guardians
“Listening to Gordie Rose and others talk about receiving ‘resources,’ for projects on ‘energy’ at CERN, and data at Kendra Corp, a logical person would ask: who is requesting this information and trying to develop applications? When they invented  Open Source, it really confirmed to me that they have built technology and now are trying to understand it. Now they ask for our help in the guise of being transparent. 
“In the arena of computer technology and the Personal Computer, these industrial giants have gotten all the help they need, and continue to somehow make great leaps and bounds using a very linear growth that is creating a new and terrifying Artificial Intelligence world.  This is the last piece of the puzzle which, consequentially, is costing trillions of dollars, allowing machines (and their masters) to project questions such as ” we need to create another intelligence so that we can communicate with the Masters on their level.”
“They are not exactly Demons, but rather Super-Intelligent-Amoral creations that view us more as  ‘ants,’  a rather eerie connotation that, in a Biblical sense, we are dealing with ‘principalities and powers.’  

WHAT SHOULD WE DO WITH TRILLIONS OF DOLLARS

“What could we do with unlimited funding?  We could fix many problems on our planet, but all of those Puppet-Master-nations rather feed money into these creations of the Military-Industrial-Complex and the Deep State.  We could change the world instead of feeding this technocratic oligarchy, who are, again,  attempting to Wield Power in becoming a god.
“There are so many great things that could come from this, but the number of negative barriers preventing the moral and humane use is countless; we should consider who they are that will be developing these things.  If this “Intelligence” has the morals and the agendas of those who would stand behind “Its” developers, we are in big trouble.  It’s time to put the breaks on these Black Projects and also a spotlight.  If this secret cabal, which now appears to be decades or centuries ahead of our professed public-knowledge, and is now asking for our help coding this, it’s time to take a moment to stop and look at what it is before we give them more help to build a huge unknown reality.  
Right now, we listen to a voice in the dark, a suspicious resource, never asking ‘why’ or ‘who.’
“I believe like most of our technologies today, like the “Space Race,” the fake Cold War, and the military use of everything new, are sought after with the first thoughts for deriving its scientific application and value to developers. Countless technologies have been developed by an inventor or engineering team who first approached the government and expounded the technologies’ military usefulness.  It’s very hard to get grants to find our real history hidden below our feet; but if you tell this warring system,  our government cabal, that you’ve found an unknown and highly specialized  weapon (or similar technologies) buried deep under a cemetery, you’ll end up with unlimited funding, exemptions from disabling laws of our oligarchic-machines, and even literally given  an Army of corporate lackeys to get to it:  Kendra Corp, Darpa, Boston Dynamics, Microsoft, and many others—these have pitched AI as the key to warfare and ‘Full Spectrum Dominance’ as their motto.

Photos Extra Gates ( httpwww.dailymail.co.uksciencetecharticle-2931375Bill-Gates-says-fear-robot-uprising-Microsoft-founder-says-agrees-Elon-Musk-dangers-AI.html ) 252A5BA400000578-29313
Eric Horvitz noted that “over a quarter of all attention and resources” at Microsoft Research are focused on artificial intelligence.
http://www.dailymail.co.uk/sciencetech/article-2931375/Bill-Gates-says-fear-robot-uprising-Microsoft-founder-says-agrees-Elon-Musk-dangers-AI.html

“Putin said that the ones who create the better AI is going to be the superpower of the future.   Now the nuclear arms race has become a race for AI. 
“These governments will fund all companies and their competition freely for new toys of death and destruction. The Manhattan project had opposing ideas: collision vs implosion devices, so both sides were funded and encouraged to compete.  In the end Robert Oppenheimer (a Nazi, a mass murderer; we had allowed him to become an  American and even had given him money instead of hanging) because of his knowledge of building better weapons. In the end, success was measured in a towering, mushroom cloud, of death, and waves of destruction.
“When the goal was reached, Oppenheimer said the famous words, “I have become Death the Destroyer of Worlds,” and that was considered his imprimatur of Success.”
Jeffrey Boyd Jr., February 12, 2018 at  2:25pm, Facebook Timeline, and  then email on 03/04/2018.  Researcher at Independent Research Society and Researcher writer at  Ancient Mysteries International.  Panelist.

Photos Extra HAL 9000 ( httpswww.theguardian.comculturegallery2015jan08the-top-20-artificial-intelligence-films-in-pictures ) 5a9f9c60-f582-45ef-a1f8-4ac9a589f12f-2060x1236
“I’m sorry, Dave, but I can’t allow you to do that.”
HAL 9000 – Heuristically Programmed Algorithmic Computer from movie 2001
httpswww.theguardian.comculturegallery2015jan08the-top-20-artificial-intelligence-films-in-pictures
********

Omar IAmone, Faizi, a panelist and the progenitor of the AI Panel, gives us some additional thoughts and facts in this research paper, giving a short introduction to the basics of robotics in the context of artificial intelligence. Artificial Intelligence is a branch of computer science concerned with making computers behave like humans. This paper describes some bad effects that can happen in the future due to the influence of artificial intelligence.

INTRODUCTION

Now in society, we are living in a world of machines. We depend on machines for every field of our life. Everything around us is applications of artificial intelligence. Air conditioners, cameras, video games, medical equipment, were traffic lights, refrigerators, etc. work on “smart” technology. Artificial Intelligence is a branch of computer science that works on to create a computer system capable to react like a human being. That is to make machines capable of sensing the world around it, to understand conversations and to take decisions as a human would. Computers have more computational power than the human brain Now, computers are millions of times faster than they were fifty years ago. Human brains seem to be far “faster” than computers for a wide variety of tasks. Still, greater computational speed does make some so-called Artificial Intelligent systems seem smarter. 
Artificial intelligence (AI) has a great role in the field of robotics. Artificial Intelligence in robotics covers topics like natural language processing, design, human factors, and computing theory. Natural language processing, a subfield of Artificial Intelligence, provides computers with the understanding they require to handle information being encoded by humans. Computer vision instructs computers on how to comprehend images and scenes. It has as some of its goals: image recognition, image tracking, and image mapping. This application is valued in the fields of medicine, security, surveillance, military operations, even movie-making.  Since the beginnings of civilization man have had a fascination for a human-like creation that would assist him. Robotics and machines come to existence from this logic Artificial Intelligence to the Hollywood generation are mostly about androids, humanoids, and robots. It is about machines going out of control, replacing humanity and world domination. There is a chance of happening this situation in the future due to the influence of Artificial Intelligence.

WHAT IS AN INTELLIGENT MACHINE

When we say intelligent machine it does not mean that it is a machine which can solve any complex program that even humans get troubled. Calculators are not intelligent. Calculators give the right answers to challenging math problems, but everything they “know” is preprogrammed by people. They can never learn anything new. Calculators are able to solve problems entirely because people are already able to solve those same problems.  We have generated many computing devices that can solve mathematical problems of enormous complexity, but those were not actually intelligent. They are pre-programmed to do exactly what we want them to do. They accept input and generate the correct output. They may do it at amazingly fast speeds, but their underlying mechanisms depend on humans having already worked out how to write the programs that control their behavior. An intelligent machine is a machine that does not have any pre-programmed data in it to solve a problem. We can also say that it is a machine which has an ability to think.

ARTIFICIAL INTELLIGENCE AND ROBOTICS

The most famous of all uses for artificial intelligence systems is robotics. Robotics is the study and development of robots Applications of artificial intelligence with robotics have taken into account in many Hollywood films. From the android Data in Star Trek to C3PO in Star Wars, people have been engaged in science fiction with countless numbers of computerized robots. In today’s world, those types of robots are still fictional. However even today we use robots in countless applications. The automation of many assembly lines now, we use robots. For example, many auto manufacturers now employ the use of robots in many jobs which require a large amount of strength.  Robots have developed a lot by the last 50 years.  Robots now can ‘see’, sense, move and manipulate, executing complex and precise tasks at very high speeds. They have come a long way from the manufacturing field. Robotics has made a lot of progress with the influence of artificial intelligence. Today’s AI machines can replicate some specific elements of intellectual ability. Now with the help of artificial intelligence robotics is trying to create machines that will have the ability to learn just about anything, the ability to reason, the ability to use language and the ability to formulate original ideas.  Computers can already solve problems in limited realms. The basic idea of artificial intelligence problem solving is very simple, though its execution is complicated.
First, the robot or computer with artificial intelligence gathers facts about a situation through sensors or human input. The computer compares this information to stored data and decides what the information signifies. The computer runs through various possible actions and predicts which action will be most successful based on the collected information. But, the computer can only solve problems which it is programmed to solve. It will not have any generalized analytical ability. Chess computers are one example of this sort of machine.  Some modern robots also have the ability to learn in a limited capacity. Learning robots recognize if a certain action (moving its legs in a certain way, for instance) achieved the desired result (navigating an obstacle). The robot stores this information and attempts the successful action the next time it encounters the same situation.
Humanoid robots are one example of this application. Again, modern computers can only do this in very limited situations. They can’t absorb any sort of information like a human can. Some robots can learn by mimicking human actions.  Some robots can interact socially. Kismet, a robot at M.I.T’s Artificial Intelligence Lab, recognizes human body language and voice inflection and responds appropriately. Kismet’s creators are interested in how humans and babies interact, based only on the tone of speech and visual cue. This low-level interaction could be the foundation of a human-like learning system. Kismet and other humanoid robots at the M.I.T. artificial intelligence Lab operate using an unconventional control structure. Instead of directing every action using a central computer, the robots control lower-level actions with lower-level computers. The program’s director, Rodney Brooks, believes this is a more accurate model of human intelligence. We do most things automatically and we don’t decide to do them at the highest level of consciousness. For example, we are not using our highest level of consciousness for closing our eyelids. Artificial Intelligence has made it possible to interact with computers by using speech instead of writing by the application of computer speech recognition. The advantages of computer speech recognition can be seen in the Hollywood film ‘IRON MAN.’

Photos Extra Robot Drawing ( httpspixabay.comenphotosartificialintelligence ) stock-photo--d-rendering-robot-learning-or-solving-problems-680929729
ARTIFICIAL INTELLIGENCE AND MEDICINE

Artificial intelligence has a great influence in the field of medicine. We will be able to get the treatment even if the doctor is not present. By taking the advances of sophisticated robotics and taking the advantages of computer vision and signal process technologies in artificial intelligence doctors will be able to direct robots remotely to treat patients. Computer vision instructs computers on how to comprehend images and scenes. It has as some of its goals: image recognition, image tracking, and image mapping. This application is very valued in the fields of medicine, security, surveillance, military operations, even movie-making. Since we are using robots for treating they will not get tired and will be more precise and accurate with there treatment. For example, robots will more accurate with stitching than a human doctor can do. Many soldiers have got killed in battlefields and have died because of not getting enough medical support. Machines with artificial intelligence can be sent to battlefields for treating the soldiers. Machines with artificial intelligence can be sent even in a space station or places humans cannot get very easily.
ARTIFICIAL INTELLIGENCE AND NANOTECHNOLOGY

Even though nanotechnology and artificial intelligence are two different fields, there are so many researches working on with the application of artificial intelligence in nanotechnology. Many signs of progress can be made by joining together the artificial intelligence and nanotechnology. Artificial Intelligence could be boosted by nanotechnology innovations in computing power. Applications of a future nanotechnology general assembler would require some AI and robotics innovations.  Nanotechnology with the help of artificial intelligence and robotics is working on to create micro machines which can change the face of the world. There are so many application for this if these small nanobots came to exist. They can be used in every important field of our life. They can be used in the field of medicine for treatment. They can be injected to the body with the medicine and will heal the decease. Nanotechnology with artificial intelligence can be used in the field of the military for increasing efficiency and develop defensive shields. Today there is still no shield that can deflect a nuclear explosion; nations are protected not by defenses that cancel offenses, but by a balance of offensive terror. The developments in this field can save the lives of many on wars.  An unfriendly AI with molecular nanotechnology (or other rapid infrastructure) need not bother with marching robot armies or blackmail or subtle economic coercion. The unfriendly AI has the ability to re-pattern all matter in the solar system according to its optimization target.
ARTIFICIAL INTELLIGENCE AND EDUCATION
Artificial Intelligence has a great role in the field of education. Computers have been used in education for over 20 years. Intelligent tutoring systems have been shown to be highly effective in increasing student motivation and learning. Computer-based training (CBT) and computer-aided instruction (CAI) were the first such systems deployed as an attempt to teach using computers. In these kinds of systems, the instruction was not individualized to the learner’s needs. Instead, the decisions about how to move a student through the material were script-like, “if question 21 is answered correctly, proceed to question 54; otherwise, go to question 32.” The learner’s abilities were not taken into account in this type of learning system. Even though both Computer-based training (CBT) and computer-aided instruction (CAI) effective in helping learners, they do not provide the same kind of individualized attention that a student would receive from a human tutor. For a computer-based educational system to provide such attention, it must reason about the domain and the learner. This prompted research in the field of intelligent tutoring systems (ITSs). ITSs offer considerable flexibility in the presentation of material and a greater ability to respond to student needs. These systems achieve their “intelligence” by representing educational decisions about how to teach as well as information about the learner. This allows for greater flexibility by altering the system’s interactions with the student. Intelligent tutoring systems have been shown to be highly effective at increasing student’s performance and motivation.
ARTIFICIAL INTELLIGENCE AND GAMING

Video games have gone through drastic improvements in the past ten years. Game artificial intelligence refers to techniques used in computer and video games to produce the illusion of intelligence in the behavior of non-player characters. Artificial intelligence in games is usually used for creating player’s opponents. The high-level strategic orders by the player are taken cared for by the artificial intelligence of the computer. Video games seem to get twice as complex in some ways every year. As these games get more complex they also get more interesting and engaging.  They are becoming an artistic form of expression for the programmers and developers Strategy games like “Warcraft 3” call for users to create an army to defeat one or more computer-controlled villages with armies of their own. These villages will form alliances, scout surrounding areas, and plan appropriate battle plans to do their best to be the last village standing. “The Sims” has reinvented artificial life in gaming. The game starts with the user controlling one person. Eventually, the character may marry and then the user can have children in the game. These “people” are wonders of artificial intelligence. They all have their individual characteristics, wants, and needs. They have the ability to fall in love, make friends, enemies, become hermits, strive for more in life, etc, and will act on their feelings at will. So, we can see that artificial intelligence have a great application in the field of gaming-Artificial Intelligence – Current Usage.

There are many applications of artificial intelligence at present.  Banks and other financial institutions rely on intelligent software, which provides an accurate analysis of the data and helps make predictions based upon that data. Stocks and commodities are being traded without any human interference – all thanks to the intelligent systems. Artificial intelligence is used for weather forecasting. It is used by airlines to keep a check on its system. Robotics is the greatest success story, in the field of artificial intelligence. Spacecraft are sent by NASA and other space organizations into space, which is completely manned by robots. Even some manufacturing processes are now being completely undertaken by robots. Robots are being used in industrial processes, that are dangerous to human beings, such as in nuclear power plants. Usage of artificial intelligence is quite evident in various speech recognition systems, such as IBM Via Voice software and Windows Vista.
ARTIFICIAL INTELLIGENCE POSITIVE APPLICATIONS IN FUTURE  
It is believed that Artificially Intelligent computers will be obviously used in the field of education. Furthermore, in the medical field scientists are speculating the development of intelligent computers that will be immune to viruses. So there will be a future with no disease.  Even now we can see small applications of artificial intelligence in our home. For example, smart television, smart refrigerator etc. In the future, better applications of Artificial intelligence will be seen in every home in the future. Artificial Intelligence with nanotechnology or other technologies may give rise to new fields in the area of science. Machines may get more sophisticated and will be the companion of man. For certain, the development of artificial intelligence will increasingly make it a part of our daily life.

ARTIFICIAL INTELLIGENCE BAD EFFECTS IN FUTURE

If there is a fair side there will be a negative side also. Even though artificial intelligence is having many advantages applications there are so many risky disadvantages also.  At a more basic level, the use of artificial intelligence in everyday tasks might produce laziness on the part of humans. The awareness that the machines have intelligence will make human to be lazy and will be forced to make everything done by the machines. Humans have an extraordinary ability to think, analyze, and use judgment. If artificial intelligence is used for interpreting, then the human mind and its capabilities might go to waste. Scientific Films today represents the developments that can happen in the future. Most of the scientific films on artificial intelligence represent the negative side of artificial intelligence. For example, if we take film ‘I ROBOT’ as an example, it represents a robot going mad against society and becoming a trait to humanity. There are many Hollywood films representing the same idea. Films like ‘TERMINATOR’ also represent the robots with artificial intelligence going mad against humanity.  Applications of artificial intelligence with nanotechnology in military field have many positive advantages like, to develop a perfect defensive shield to any attacks. However, it has a dangerous side also. With the help of artificial intelligence and nanotechnology, we will be able to develop very powerful and destructive weapons. In the Hollywood film ‘G.I. JOE’ the weapons made by the application of nanotechnology and artificial intelligence is shown.  If we give intelligence to machines, they will be able to utilize it in its maximum extent. And machines with intelligence will become more intelligent than its creators.

.

Photos Extra Blade Runner MV5BMjM0MTQyZTAtYmU4Ni00ODhhLTgxMmItZGUyNmIyMGRkNTM5XkEyXkFqcGdeQXVyNzg2ODI2OTU@._V1_SX1777_CR0,0,1777,735_AL_
Movie Scene from  Blade Runner 2049.
https://www.youtube.com/watch?v=712H8CP01Dk 
https://www.youtube.com/watch?v=rrZk9sSgRyQ

So, there will be a chance of humanity under control machines. In future, there may be more types of robots with artificial intelligence. Applications of artificial intelligence in the military field will give rise to more sophisticated and user-friendly warfare’s. By the invention of artificial intelligence, scientists will be able to prove that human intelligence is purely mechanical and can be duplicated. If this happens, it would break man’s view of himself as a unique being. The future artificially intelligent machines can become even more intelligent than humans. By that, there will be a situation of man v\s machines like we see in science fiction films.  Computers are more capable of producing accurate results. So, they will potentially replace humans in jobs that are better suited for them. This could mean that the workplace will no longer be a man’s domain. Unemployment rates could go up. Humans could soon lose their ground as a dominant creature. Most critical of possibilities is the complete destruction of the human race.  Moreover, the fast developments in the areas of artificial intelligence and robotics may push earth to a critical state. Even now the wastes of computer parts and other electronic devices are making a great disturbance to our nature and earth. In the future, our planet Earth may go to black from green due to the pollution that can happen by the development of artificial intelligence.
CONCLUSION
Technology is neither good nor bad. It never has been. Artificial Intelligence is a field in which so many researches are going on. Artificial Intelligence is the subfield of computer science concerned with understanding the nature of intelligence and constructing computer systems capable of intelligent action. Even though, humans are having intelligence they are not able to use it to the maximum extent. Machines will be able to use 100% of its intelligence if we gave them intelligence. It is an advantage as well as a disadvantage. We depend on machines for almost every application in life. Machines are now a part of our life and are used commonly. So, we must know more about machines and should be aware of the future that can happen if we give them intelligence. Artificial Intelligence cannot be as bad or good. It varies in the way we utilize and use it.
YouTube Link For AI Panel Talk

https://youtu.be/F2G6sI1B3hE

***
No Escape – Dawn of Destruction – Controls All
American Intelligence Media Presents Douglas Gabriel and Michael McKibben
https://www.youtube.com/watch?v=6Sl9ZF1wcX4&feature=player_embedded
***.

The subsequent list of sites and sources are meant to be adjunct aides on this topic to be viewed in a general sense (there are so many more out there; go locate them, before they are all taken down): 
Quote from the article below:  ” If it were not for use of psychotronics for torture, there would be few Targeted Individuals.  Criminal perpetrators exploit ‘less-lethal Directed Energy Weapons’ and psychotronic techniques to inflict pain and unpleasant sensations on victims however far away they may be, and they can do it anonymously.”
https://martinacable99.wordpress.com/2012/11/04/targeted-individuals-psychotronics-anonymous/
***
Quote from the below article:  “It’s all very, very similar to the NSA and CIA…very, very top-secret,” said A.H, and he explained in further detail: Essentially, the covert management of this matter operates as part super-secret organized crime operation. It is more like a secret mafia than a government entity…extra-constitutional, both in the U.S and the U.K, as well as other countries…A criminal enterprise and a conspiracy of the first order…assassinations, murder, kidnapping, theft of technology…spin-off technologies based on the study of ET objects…” 
Whistle-blower A.H –  https://wordpresscom507.wordpress.com/2018/02/23/the-naked-ufo-deep-state/
***
Quote from the below article:  “Mustapha Mond, one of ten world controllers in Brave New World and the evil Obrien of 1984’s nation of Oceana, both knew what they were doing. They were fully conscious in order to exert complete control and ensure the continuation of their respective, fictional nation-states…could this type of power consolidation occur in the real (non-literary) world?…answer that question one only needs to study history then, go turn on all of the various ‘telescreens’ in their private homes: Televisions, smartphones, tablets, lap-taps and desktop computers. Tyrannical regimes have been centralizing and fortifying ramparts of power from the time man first crushed grapes. And, obviously, as the exiled enemy of the State, Edward Snowden, has revealed, modernity is no antiserum to the cancerous systematization of power.”
http://www.shtfplan.com/headline-news/prisons-of-pleasure-or-pain-huxleys-brave-new-world-vs-orwells-1984_02282018
***
Quote from the below article: “Secret Intelligence Industrial Complex…CIA, NSA, NGA, and NRO form a massive, secret government.  Around that, there is a secret corporate monopoly made up of Leidos Holdings, CSRA, CACI, SAIC (who lost $7 Billion of taxpayer money in failed programs) and Booz Allen Hamilton. This monopoly sucks up around $50 Billion per year from taxpayer revenues in secret.  These groups are accountable to no-one.”
https://steemit.com/politics/@ura-soul/the-whistleblowers-series-28-cia-whistleblower-exposing-massive-crime-the-us-congress-and-senate-are-controlled-by-a-real-shadow
***
Quote from the below article:  “Michael Snyder of The Truth Wins asks: What will you do when you can no longer buy or sell without submitting to biometric identification?  This technology is going to keep spreading, and it is going to become harder and harder to avoid it. And it is easy to imagine what a tyrannical government could do with this kind of technology.  If it wanted to, it could use it to literally track the movements and behavior of everyone…And one day, this kind of technology will likely be so pervasive that you won’t be able to open a bank account, get a credit card or even buy anything without having either your hand or your face scanned first.”
http://www.shtfplan.com/headline-news/the-mark-scientist-claims-human-microchip-implants-will-become-not-optional_04242014
***
Quote from the below article:  “Systemic dehumanization…Existing inequities will surely be magnified with the introduction of highly effective psycho-pharmaceuticals, genetic modification, super intelligence, brain-computer interfaces, nanotechnology, robotic prosthetics, and the possible development of life expansion. They are all fundamentally inegalitarian, based on a notion of limitlessness rather than a standard level of physical and mental well-being we’ve come to assume in healthcare.  It’s not easy to conceive of a way in which these potentialities can be enjoyed by all.”
https://theconversation.com/super-intelligence-and-eternal-life-transhumanisms-faithful-follow-it-blindly-into-a-future-for-the-elite-78538
***
 Quote from the below article:  “Mind Control — UFOs, cattle/human mutilations, extreme human experimentation — Many people claim to have been abducted by aliens and taken to underground bases, such as the Dulce base in New Mexico, and witnessed extreme experimentation being carried out not just on humans but also on other animals and creatures, including aliens…Then there’s also all the cattle and human mutilations that happen (although human mutilations seem to be kept very quiet) – one Brazilian military official was found in 1994 after his internal organs had been sucked out through his anus whilst he was still alive. His left eyelid and jawbone had been removed with surgical precision using some kind of laser technology and it seems that these types of subjects (crop circlesUFOsfree energy, mind control, the illuminati, etc) are all subject to disinformation…”
https://hubpages.com/education/Mind-Control-In-America-The-CIA-MK-ULTRA-Brainwashing
***
Quote from the below article:  “What has definitively happened since 1970, and particularly since September 2001, has been a government agency sanctioned and run amok murder ring, with attending insanity where caution and restraint have been thrown to the wind. This fact, combined with a ‘security’ apparatus which has grown to gargantuan proportions, can no longer conceal what has become a criminal enterprise, comprising religious extremist politicians,  top military brass who happen to be the ‘politicians’ allied (to) Christian fanatics, coupled with extremist professional corporate mercenaries largely staffed by former spooks and military special operations veterans euphemistically known as ‘contractors.’”
http://subversify.com/2011/10/14/cracking-the-matrix-our-militaryindustrial-spy-services/
***
Quote from the below article: “Science advances, antennas get more powerful, and very little attention is paid to the butterfly effect.  These artificial resonations are adverse to the health of humans and wildlife worldwide and the side-effects of these experiments are unknown as these facilities operate in secrecy…Demand more transparency in the world of brain-altering electric signals, and learn how they are altering our spaceour skies, and our Earth while blaming it all on climate change.  Be sure to check out our maps of all these facilities with our ClimateViewer 3D.”  
 https://climateviewer.com/2014/10/11/haarp-elf-generation-mass-mind-control/
***
Quote from the below article:   “It is clear that some kind of artificial intelligence is driving the synthetic agenda. We are up against some kind of dark force that has hacked life itself.  This primal virus has many of the characteristics we have historically attributed to artificial intelligence: soulless, dull, hive-mind mentality, without free will, unable to feel, only able to give answers (unable to ask questions), and without creative power (unable to create without first being programmed or told how to create).  It’s a parasite.   It has latched onto an existing reality, ‘hacked’ it by taking over the program in some way, and is now busy creating its own modified version of reality (a fake and pale imitation) – a bastardized, poisonous and synthetic reality which is threatening to destroy the original host.  It is, indeed, the System.  It is the Matrix.”
http://freedom-articles.toolsforfreedom.com/synthetic-agenda-heart-new-world-order/
***
Quote from the below article:  “Just last year the Dailymail reported that scientists had discovered a trick to plant false experiences into people’s brains. As Huffington Post reported in 2014 ‘Mind control is becoming a reality,’ in the clear science world, while black project scientists are far ahead of these advances as this article illustrates.”
https://steemit.com/news/@an0nkn0wledge/i-hear-voices-mkultra-a-worrying-trend-of-mass-shooting-suspects-throughout-history-before-committing-horrific-murders
***
Quote from the below article:  “One especially invasive attack method in the arena of ‘psycho-electronic’ mind control is ‘voice to skull.’ Voice to the skull is the transmission of voice, or any other audible or subliminal sound, directly into the hearing sense of the mind control victim. This is sometimes done around the clock and can be one of the severest forms of torture. Voice to skull technology is sometimes referred to as ‘synthetic telepathy.’  Current-day voice to the skull cannot be stopped by any known electromagnetic shielding, a fact which demonstrates how advanced classified mind control technology has become.”
https://sites.google.com/site/targetedindividuals101/home/v2k
***
Photos Extra Albert ( httpswww.smithsonianmag.cominnovationwhat-happens-when-artificial-intelligence-turns-us-180949415 ) terminator
I’ll  be Back
https://www.dailystar.co.uk/movies/377217/Doctor-Who-star-Matt-Smith-joins-the-cast-of-Terminator-Genesis-reboot
***
https://www.youtube.com/watch?v=XvzNuw5VjBU
***
***

https://www.youtube.com/watch?v=7-vFiHS8HC0&feature=share
***
***

https://www.youtube.com/watch?v=TRzBk_KuIaMhttps://www.youtube.com/watch?v=TRzBk_KuIaMhttps://www.youtube.com/watch?v=TRzBk_KuIaMhttps://www.youtube.com/watch?v=TRzBk_KuIaMhttps://www.youtube.com/watch?v=TRzBk_KuIaM
Will We Ever Learn?
***
***
***

***
You can reach Steve Erdmann – at – dissenterdisinter@yahoo.com  – or –  independenterdmann@gmail.com.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can friend him at:
Facebook – https://www.facebook.com/stephen.erdmann1 –
Or – visit the Dissenter/Disinter Group – https://www.facebook.com/#!/groups/171577496293504/.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can also visit his articles at the following:
mewe.com/i/stephenerdmann1
 http://www.minds.com – TheDissenter,
http://www.ufospotlightwordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/,
https://www.facebook.com/TheUniversalDigest/?__tn__=%2Cd%2CP-R&eid=ARB3i9eJwirzOvkPMA5RwMhIUX-3xSP69ME1YHZhQjeSqnxoiNgzhKt1WVX8EUlupUgLBVzd_mX-VXAN
*******
Steve Erdmann, 2018, St. Louis
*******
Photos Extra Steve2 34962959_10156520897759595_6984102889039855616_n
Steve Erdmann – Independent Investigative Journalist 

Another version of this article can be send at:

The AI Truth Panel – – https://wordpresscom507.wordpress.com/2020/06/07/
Westworld (2016)

Another version of this article can be send at:

The AI Truth Panel – – https://wordpresscom507.wordpress.com/2020/06/07/

Eye in the Sky!

“I’m the eye in the sky…..”

Terrorism: More Than Meets the Eye

By:

Steve Erdmann

Copyright, Steve Erdmann, 2018

This article was previously published in the February 3, 2018 issue of http://www.wacherstalk.com and is reproduced with permission. 
https://www.watcherstalk.com/terrorism-more-than-meets-the-eye-i-am-the-eye-in-the-sky/
Iamtheeyeinthesky cropped-watchers-talk-seal-website-3
Minimal quotes are allowed to journalists and reviewers for news dissemination with credits. 

Another version of this article can be seen at I am the maker of rules – – https://wordpresscom507.wordpress.com/2020/06/07/

The Alan Parsons Project Lyrics

     “Eye in the Sky”
Don’t think sorry’s easily said
Don’t try turning tables instead
You’ve taken lots of chances before
But I ain’t gonna give any more
Don’t ask me
That’s how it goes
‘Cause part of me knows what you’re thinking…
Don’t say words you’re gonna regret
Don’t let the fire rush to your head
I’ve heard the accusation before
And I ain’t gonna take any more
Believe me
The sun in your eyes
Made some of the lies worth believing
[Chorus:]

I am the eye in the sky
Looking at you
I can read your mind
I am the maker of rules
Dealing with fools
I can cheat you blind
And I don’t need to see any more
To know that I can read your mind, I can read your mind, I can read your mind, I can read your mind
Don’t leave false illusions behind
Don’t cry ’cause I ain’t changing my mind
So find another fool like before
‘Cause I ain’t gonna live anymore believing
Some of the lies while all of the signs are deceiving
[Chorus]

Eye in the Sky” is a 1982 song by the British rock band The Alan Parsons Project from the album Eye in the Sky. It hit #3 on the Billboard charts in the U.S. in October 1982,[1] #1 in both Canada and Spain, and #6 in New Zealand and was their most successful release. The instrumental piece entitled “Sirius” segues into “Eye in the Sky”‘ on the original recording.

***
https://www.youtube.com/watch?v=NNiie_zmSr8
***
Iamtheeyeinthesky quote (httpsedri.orgsnowden-surveillance-control ) Snowden
https://edri.org/snowden-surveillance-control/

The Wall Street Journal mentioned on August 15, 2007 that the United States was planning to expand its use of reconnaissance satellites, but also over the United States to aid civil agencies, in response to recommendations by an independent study group. The term ‘civil agencies’ referred to agencies outside of the Defense Department and Intelligence Community – agencies which may have domestic or foreign missions, or both – The satellites were updated in 2008 to report on domestic use on the U.S as “spy satellites.”

“The recent revelations regarding the extent of NSA eavesdropping is only the tip of the iceberg.  We are currently in an information war and a mind war, where our privacy and autonomy as human beings are at stake…In 2010, the NSA admitted it was using a ground wave-based weapon that was playing havoc with electricity…known as TAO…accesses computers, as well as people’s brains…” 

Cheyannescampsite.blogspot.com/2015/02/guinea-pigstechnologies-of-control.html
Photos Extra Eye ( httpwww.bbc.comfuturestory20140702-why-i-asked-to-be-possessed ) eXTRR p021zhgp
http://www.bbc.com/future/story/20140702-why-i-asked-to-be-possessed

PART I

Some Modern Spying Capabilities
A PREFACE TO TERROR

November 22, 2010.

On Sunday November 21, 2010 at 5:58pm, the USAF launched NRO LR-32, a secret US military spy satellite. The satellite was so huge that it required this Delta IV Heavy rocket to reach orbit. The cryptic satellite had been, at that time, the largest satellite in the world.

According to the National Reconnaissance Office’s Director Bruce Carlson, the NRO LR-32 is indeed “the largest satellite in the world.” The NRO is dedicated to the design, manufacturing, and operation of all the United States reconnaissance satellites. This particular satellite was “believed to be an eavesdropping satellite positioned high above the equator in geosynchronous orbit.” It had an antenna the size of a football field once the antenna had been fully extended in orbit.

iamtheeyeinthesky NROL52 ( httpswww.kennedyspacecenter.comlaunches-and-eventsevents-calendar2017octoberrocket-launch-ula-atlas-v-nrol-52 ) av_nrol42_l2 for web
The October 7, 2017 launch of NROL-52 upon an AtlastV
https://www.kennedyspacecenter.com/launches-and-events/events-calendar/2017/october/rocket-launch-ula-atlas-v-nrol-52

Similarly, the Delta IV Heavy rocket was the largest rocket in the world at that time in size, capable of producing 1.9 million pounds of thrust using its three engines.

Even further, and with twenty-five years after their top-secret, Cold War-era missions ended, two clandestine American satellite programs were declassified Saturday, September 17, 2010: the unveiling of three of the United States‘ most closely guarded assets: the KH-7 GAMBIT, the KH-8 GAMBIT 3 and the KH-9 HEXAGON spy satellites.

Both of the newly declassified satellite systems, GAMBIT and HEXAGON, followed the U.S. military’s front-runner spy satellite system CORONA, which was declassified in 1995.

Iamtheeyeinthesky ( httpswww.cnn.com20160901usdeclassified-spy-satellite-hexagonindex.html ) 160827172350-hexagon-photo-spy-satellite-exlarge-169
HEXAGON SPY SATELLITE
https://www.cnn.com/2016/09/01/us/declassified-spy-satellite-hexagon/index.html

BIG, BAD SPY SATELLITES

The KH-9 HEXAGON, nicknamed “Big Bird,” was as large as a school bus. The KH-9 HEXAGON carried 60 miles of high resolution photographic film for space surveillance missions.

“This was some bad-ass technology,” Dwayne A. Day told SPACE.com. “The Russians didn’t have anything like it.”

Day, co-editor of “Eye in the Sky: The Story of the Corona Spy Satellites,” wrote that “it took the Soviets on average five to 10 years to catch up during the Cold War, and in many cases they never really matched American capabilities.”

Phil Pressel, designer of the HEXAGON’s panoramic ‘optical bar’ imaging cameras, agreed with Day’s assessment.

“This is still the most complicated system we’ve ever put into orbit …Period.”

The HEXAGON’s twin optical bar panoramic mirror cameras rotated as the swept back and forth when the satellite flew over Earth: intelligence officials referred to this as “mowing the lawn.”

The 6-inch wide frame of HEXAGON film captured a wide image of terrain covering 370 nautical miles. This was comparable to the distance from Cincinnati to Washington on each of its passes over the former Soviet Union and China. The satellites had a resolution of about 2 to 3 feet (0.6 to nearly 1 meter), according to the NRO.  This demonstrated the 10 Ways the Government Watches You.

Each HEXAGON satellite mission lasted about 124 days, with the satellite launching four film return capsules that could send its photos back to Earth. Whereupon an aircraft would catch the return capsule in mid-air by snagging its parachute as the canister re-entered the atmosphere.

The film inside the protective bucket reported contained high resolution photographs of the Soviet Union’s submarine bases and missile silos.

Hubble Compared to Hexagon

International Space Station flight controller Rob Landis, now technical manager in the advanced projects office at NASA’s Wallops Flight Facility in Virginia, is quoted (in noticing some distinct similarities between Hubble and the huge KH-9 HEXAGON reconnaissance satellite):

“I see a lot of Hubble heritage in this spacecraft, most notably in terms of spacecraft size,” Landis said. “Once the space shuttle design was settled upon, the design of Hubble — at the time it was called the Large Space Telescope — was set upon. I can imagine that there may have been a convergence or confluence of the designs. The Hubble’s primary mirror is 2.4 meters [7.9 feet] in diameter and the spacecraft is 14 feet in diameter. Both vehicles (KH-9 and Hubble) would fit into the shuttle’s cargo bay lengthwise, the KH-9 being longer than Hubble [60 feet]; both would also fit on a Titan-class launch vehicle.”

Another former spacecraft designer said bluntly:

“The space shuttle’s payload bay was sized to accommodate the KH-9.”

THE GAMBIT SPY SATELLITE

The NRO launched 20 KH-9 HEXAGON satellites from California’s Vandenberg AFB from June 1971 to April 1986. The GAMBIT satellite program was active from July 1963 to April 1984. Both satellites were huge and launched out of Vandenberg Air Force Base.

The HEXAGON’s final launch in April 1986 met with disaster as the spy satellite’s Titan 34D rocket boosters erupted into a massive fireball just second after liftoff. This crippled the NRO’s orbital reconnaissance capabilities for many months.

Before the first HEXAGON spy satellite systems was ever launched, the NRO’s GAMBIT series of reconnaissance craft flew several space missions providing  surveillance over special targets around the entire world.

The NRO said that GAMBIT 1’s initial system, first launched in 1963 carrying a KH-7 camera system, included a “77-inch focal length camera for providing specific information on scientific and technical capabilities that threatened the nation.” A second GAMBIT satellite system, which first launched aboard GAMBIT 3 in 1966, included a 175-inch focal length camera. The GAMBIT 1 series satellite has a resolution similar to the HEXAGON series, about 2 to 3 feet, but the follow-up GAMBIT 3 system had an improved resolution of better than 2 feet.

The initial version was 15 feet long and 5 feet wide, and weighed about 1,154 pounds. The GAMBIT 3 satellite stretched nearly 29 feet long, not counting its Agenda D rocket upper stage.  It weighed about 4,130 pounds.  The GAMBIT series were designed for extremely short missions.

The GAMBIT 1 craft had an average mission life of about 6 1/2 days, 38 missions. The GAMBIT 3 series averaged about 31 days. In all, 54 of the satellites were launched.

The GAMBIT series of satellites returned their film to Earth in re-entry capsules snatched up by recovery aircraft. GAMBIT 1 carried about 3,000 feet of film, while GAMBIT 3 was packed with 12,241 feet of film.

THE CIA, HEXAGON AND GAMBIT

The enormous HEXAGON was launched with 60 miles – or – 320,000 feet of film!

NRO officials confirmed that the KH-8 GAMBIT 3 and KH-9 HEXAGON were later operated in unison: both working to photograph areas of military importance in both the former Soviet Union and China.

The KH-9 would image a wide swath of terrain later examined imagery analysts looking ‘targets of opportunity.’ Following, then, when these potential targets were identified, a KH-8 would be positioned to photograph the ‘target’ in much higher resolution.

“During the era of these satellites — the GAMBIT and the HEXAGON — there was a Director of Central Intelligence committee known as the ‘Committee on Imagery Requirements and Exploitation’ that was responsible for that type of planning,” explained the NRO’s Robert McDonald, Director of the Center for the Study of National Reconnaissance.

NASA’s Rob Landis spoke candidly and pointedly about the then worrisome declassification of the GAMBIT and HEXAGON programs.

“You have to give credit to leaders like President Eisenhower who had the vision to initiate reconnaissance spacecraft, beginning with the CORONA and Discoverer programs,” Landis said. “He was of the generation who wanted no more surprises, no more Pearl Harbors.”

http://www.foxnews.com/scitech/2011/09/19/declassified-us-spy-satellites-reveal-rare-look-at-secret-cold-war-space/#ixzz1s3MNzwDL
https://www.cnn.com/2016/09/01/us/declassified-spy-satellite-hexagon/index.html
https://en.wikipedia.org/wiki/KH-7_Gambit
A SHORT HISTORY OF COMMUINCATION AND SPY SATELLITES

Since the spy satellite era began with AMSAT-OSCAR on November 15, 1973, governments have been orbiting a progression of communications and reconnaissance satellites down through the years.  Odd and curious names are given such as CORONA, ARGON, LANYARD, GAMBIT, QUASAR, LACROSSE, ONYX, the KH series, the USA series, the NROL series, down to the recent NROL-47 on January 12, 2018. 

Iamaeyeinthesky Nrol1 ( httpwww.popularmechanics.comspacerocketsa15063029ula-nro-spy-satellite-launch-2018 ) dtrsfcoxkaed5nc-1515698266
SPACE LAUNCH OF A NROL SERIES SPY SATELLITE 2017
https://www.kennedyspacecenter.com/launches-and-events/events-calendar/2017/october/rocket-launch-ula-atlas-v-nrol-52

Out of the estimated 4,635 satellites sent into orbit, an equally estimated 1,738 are still in orbit, though high security prevents any accurate information. Most recently, we are investing in INTRUDER-12 through the SIGINT.

The Russian government, having the same problems, launched similar satellites of the KOSMOS and ZENIT series from 1961 through 1994. China has launched the GAOFON4, Germany and a few others – the SAR-LUPE, The Middle East – the OFER, Japan – the IGS, Egypt – the DESERTSAT, Finland – the ICEYE.

JOHN HALL’S HIDDEN WORLD
Iamtheeyeintheskyrobot1 ( httpwww.bbc.comnewsmagazine-41504285 ) _98297667_gettyimages-177090022_976b
http://www.bbc.com/news/magazine-41504285

Dr. John Hall has entered a very dark and virulent world in his story about Big Brother gone awry and crazy far beyond George Orwell’s tale of oligarchic- people-controllers. Orwell spoke of Mind Control. That was children’s play compared to what Dr. Hall says is really going on today and has happened to him personally: control of his life, and that of his friends, by advanced technological space satellites……….And the use of many other devices and Deep State technology.

PART II

“I can read your Mind….”

Hall also believes, based on individual testimonies that many people may be under attack and even murdered by criminals that have tapped into computer-satellite technology and used it to harass, control, and kill victims.  A case in point: He and his girlfriend Mallory, whom, he believes, were drugged, zapped by satellite technology, with Mallory raped by a man and his cohorts whom Hall refers to as ‘The Ghost.’ The Ghost uses an array of X-ray, microwave, GPS, EEG monitoring, ultrasonic sounds, particle beams, and a suspected armada of sophisticated technology that these present-day stalking terrorists have somehow latched onto.

(A New Breed: Satellite Terrorism in America, Dr. John Hall, Strategic Book Publishing, 12051 Indian Creek Court, Beltsville, MD 20705, 866-640-6397, [was  845 Third Avenue, 6th Floor, Suite 6016, New York, N.Y., 10022.] 129-pages. $22.50.)                                 

“The Ghost” is described as an “ex-FBI curmudgeon” who parades as a moral pillar of his community, but now moves through fellow co-conspirators and a special elite to use this secret technology; he also uses more down-to-earth but just as superior spy devices and detective operandi – to drug, stalk, break and enter, spy and eventually rape good-looking women, encasing them as “zombies” to do this group’s bidding.  Hall’s love, Mallory, is one victim.   As Hall began to gather evidence to present against “The Ghost” and his operatives (whom Hall calls the Byler family, the K.F. Higgins [detective] Associates, a Harry Shelby, and others), these criminals have gone on a rampage to destroy Hall, his career and life.

“Satellite surveillance has taken invasion of privacy to an all new high,” says Hall, “the current satellite surveillance systems used by the government, and those illegally accessing it, can see you indoors and out, alter your moods, hear your thoughts, attack you with weaponry and access your financial accounts; it’s no longer science-fiction when it’s really happening to thousands of people across the United States and uncounted numbers worldwide.”  

Hall is a member of the Mind Science Foundation, as well as a diplomat of the American Board of Anesthesiology, and belongs to the American Association of Physicians and Surgeons.

How “The Ghost” gained the capabilities to manipulate satellite technology is not clear. That must come at a ‘cost’ to “The Ghost.”  Hall mentions a surgeon, Harry Shelby, and Hall connects the dots through a long list of people, detective agencies, and relations to a family called “The Bylers.” How did these people obtain access to this super-technology; from whom and at what price? It is not enough that the average person must worry about and contend with expensive and new wars, world-wide financial ruin, a disappearing dollar, and unhealthy epidemics: now we must contend with spy technology used against American citizens – indeed, the world. Are these Mysterianisms, these ‘Ghosts,’ operating in many countries and about the globe?  Is there a Master Ghost, a sort of a Grand Dragon, correlating the whole formidable and morose strategy? Are they causing UFO and ghost phenomenon? Do they want to drive us crazy?

“With all the breaking and entering I’ve described, you’re probably wondering, don’t these people have alarm systems?’’ asks Dr. Hall.  “If you are under satellite surveillance they can hear the pass codes you formulate as well as watch you punch them into the key pad,” Hall continues. “To further complicate things, in my case, the criminals had prior security company experience; they will know their way around your alarm system better than you do.” 

PART III

“…..I can cheat you blind……”
GINEA PIGS AND CONTROL UNITS.

“For years the federal government has sought to remotely control human behavior. Starting with the CIA projects MKULTRA and MKSEARCH in the 1950s, the American public has been unwitting guinea pigs in a multitude of non-consensually performed experiments that have continued into the 21st century. Guinea Pigs takes readers on a journey into the darkest corners of U.S. non-consensual experimentation and the various technologies of control that have led to our current surveillance state. The recent revelations regarding the extent of NSA eavesdropping is only the tip of the iceberg. We are currently in an information war and a mind war, where our privacy and autonomy as human beings are at stake. Guinea Pigs will arm you with the information needed to fight back against those who seek to eliminate human free will. Over the coming years, terms like ‘remote neural monitoring,’ ‘brain-mapping,’ and ‘electronic harassment’ will become household words, to be one step ahead of the game, be prepared for the future with Guinea Pigs.”

Strategic Book Publishing & Rights Agency, 2015.
Dr. John Hall
http://www.allpointsllc.com/all-points-attends-huntsvillemadison-chamber-of-commerce

“Born in San Antonio, Texas, home of the Alamo, John Hall is a physician who considers writing his second profession. ‘Knowing the United States government’s dismal track record with regard to experimenting on the public without informed consent, the sheer number of people voicing identical complaints of electronic harassment, and surveillance had to be explored logically.’”

Publisher’s website: http://sbprabooks.com/JohnHall.  .

Dr. John Hall continues his expose’ in his other book Guinea pigs: Technologies of Control (Strategic Book Publishing, 12051, Indian Creek Court, Beltsville, MD. 20705, 866-640-6387, 703-637-6006, 2015, 196 pages, $23.00).

Iamtheeyeinthesky Cover ( httpswww.amazon.comGuinea-Pigs-Technologies-John-Halldp163135552X ) 51TXj9oc5eL._SX331_BO1,204,203,200_
 Guinea Pigs Technologies of Control by John Hall, Strategic Book Publishing & Rights Agency, LLC
https://www.amazon.com/Guinea-Pigs-Technologies-John-Hall-ebook/dp/B00T25NQDM

Through various agents, such as Catharine Austin Fitts and Wired Magazine, thousands of individual witnesses, and other sources, Hall has come to discover different aspects of this clandestine and illegal activity: digital transfers, experimental electromagnetic control methods using ‘ELF waves,[1] microwave technology (such as microwave ‘guns,’ heart-attack ‘guns’: he saw Bob Fletcher’s shoulder blasted apart), Jim Jones connection to the CIA, Sonic nauseators, millimatter wave weapon (he has seen bodies dehydrated and shrunk to nothing), Zombie-guns, satellite microwave weapons, solar-powered ‘blimps’ housing this technology, LRAD acoustic weapons, miniaturized spy drones, Nano-implants, Mind Control, V2K (Voice to Skull), MK Ultra, Ionizing Radiation, Energy Directed Weapons, Gang Stalking, Psychic Warfare, Mass Entrainment, Light/Sound Programmable Media, Sexualized Hypnosis, Hypnotic Suggestion, Mass Hypnosis, and Satellite ‘Death Ray’ type beams to name a few out of  so many other technologies, designed, not for just catching spies, but, in the words of Hall, for “control” of the general populace.

The government had created in 2011 a new 3-billion-dollar ultra-spy agency called the National Geospatial Intelligence Agency (NGA) devoted solely to visual or photographic spying, situated in Washington, D.C and St. Louis, Missouri. 

Iamtheeyeinthesky August 2013 ( Aug. 2013 httpswww.nasaspaceflight.com201308ula-delta-iv-h-launch-nrol-65 ) NROL 13
NROL-13 BEING LAUNCHED AUGUST 13 2013
https://www.youtube.com/watch?v=Wr_0mQGxyTo

“It is inhumane and evil to subject any person to organized stalking/surveillance groups and/or direct energy weapon attacks.  The victims are merely witnesses to the unbelievable crimes that are done with Nazi-like mentality; methods of human experimentation and torture,” said Kenneth M. Wilborne, Jr.  “No one should expect a witness of these crimes to be equipped to prove the crime that has been done against them. Direct energy weapons are hi-tech political control technology. One would have to be a Physicist with proper government security clearance and access to specific classified information to understand exactly how the direct energy weapons work and what impact they have on the biology of a human subject.

“There are too many citizens of the USA and of the world (known as Targeted Individuals) who are complaining all over the internet about the problems of organized group stalking/surveillance groups and/or direct energy weapon attacks. Direct energy applications to the body and brain dismantle a Targeted Individual’s physical and – mental health – often to the point of disability and/or premature-death.

“Direct energy assaults to a person’s brain or body can cause plausible symptoms of mental and physical illnesses. Plausible deniability is used by some doctors and some law enforcement to say the Targeted Individual is mentally ill and experiencing chimerical thinking from being psychotic which is a lie either from ignorance, corruption, or coercion or said under the guise of ‘national security.’  Any time such a lie is done intentional, it is a lie right of the pit of Hell. It is a serious sin to attempt or succeed at taking away the God given free-will of a person to change their character or control them by influencing their decisions by using hi-tech mind control methods and/or organized group stalking to use the threat of punishment or threat to terminate a person’s life. All these objectives are tampering with many intelligent and innocent people’s God-given life.” 

https://www.barnesandnoble.com/w/a-new-breed-satellite-terrorism-john- hall/1016514132.

Hall says that most of the time, though not inclusively, these harassments and interventions are carried out by sub-contracted and contracted agencies, such as former FBI, CIA, and other connected-intelligence-partners that have been given access to routes to use the technology for ‘experiment’ and data gathering, which, turn, is the turned over to their ‘handlers’ and ‘headquarters.’

Hall was on the COAST TO COAST radio broadcast and he explains that while political dissidents are potential victims of electronic harassment, Hall suggested, in the words of COAST TO COAST “that middle to lower middle class people as well as prisoners and the homeless could also be seen as ideal candidates for testing the technology. He explained that this would allow for those who are controlling the experiment to get a greater data set and see which tactics work best. However, Hall also puts forward a troubling, potential alternative scenario which was imparted to him by an insider working with this technology. According to that source, Hall said, the victims of electronic harassment are actually the outliers who are not susceptible to the control system. ‘That’s a very scary thought,’ he observed, ‘because that tells me that the majority of people are already being controlled.’”

https://www.coasttocoastam.com/guest/hall-dr-john/43636

John Hall is one of the most knowledgeable persons investigating the topic.  His research and advice should not be taken lightly:

“The weapons used in the attack phase include microwave, millimeter wave, radio-frequency, laser and probably scalar modalities. All of these modalities have been researched extensively and weaponized for military use as mentioned earlier in the book. While they have all been identified under the heading of ‘non-lethal’ weapons, non-lethality in the research setting was not based on 24/7 exposure. Moreover, the exact effect of their exposure long term on the human body is not known, at least not in official research. The victims of the current experimentation may be the guinea pigs of some type of long term exposure protocol that is too unethical to be done under a legitimate Institutional Review Board with consenting volunteers.”

http://911nwo.com/?p=4600
http://cheyannescampsite.blogspot.com/2015/02/guinea-pigstechnologies-of-control.html..
THE BELL RINGS

A virtual army of victims and people are now speaking out.  One such person is Michael Fitzhugh Bell, who has written several books detail his episodes with these agencies.

In his first book, Bell described how he became an unwitting victim of the United States Government, he’s known as a Targeted Individual. Bell has been illegally implanted with nonconsensual, non-therapeutic biomedical implant devices which cause severe suffering, physical torture and psychological terror. 

“This crime has infiltrated every aspect of society and is secretly flourishing at the expense of the U.S taxpayer,” said Bell.

As a Whistleblower, Bell said he is a victim of what is referred to as an Unacknowledged Special Access Program (U.S.A.P.) created by the United States Government, believed to be part of the Military Black Ops portion of the Shadow Government. Bell is under constant attack by Bioelectronic Torture Weapons eternally in a continual assault on his life.

Photos Extra Ghost ( httpswww.facebook.comphoto.phpfbid=1783784761652956&set=a.891495037548604.1073741827.100000643498963&type=3&theater ) 25588028_1783784761652956_5906866604602380751_o
https://www.facebook.comphoto.phpfbid=1783784761652956&set=a.891495037548604.1073741827.100000643498963&type=3&theater

Bell is victimized through the illegal misuse of advanced nanotechnology, biomedical devices embedded throughout his body, using clandestine Government Classified Technologies. His first book demonstrated this and contains actual verified Doctors reports and documented medical images to prove this fact.

The Invisible CrimePart TwoA Targeted Individual, Synthetic Telepathy, [2]and Global Criminal Biomedical Human ExperimentationA True Story,” goes further than previously in print, disclosing an astonishing truth that remains part of a secret Government Human Experimentation and illegal, non-consensual clinical trial test program.

http://www.michaelfbell.com/
A STRANGE SCI-FI WORLD COME TRUE

To control beautiful women for purposes of sex is hardly a Boy Scout’s oath of loyalty; rather, it sounds like science-fiction prophecy come true: Richard S. Shaver and his Dero control, H.G. Well’s Morlocks, Stanley Kubrick’s Eyes Wide Shut (Traumnovelle, Arthur Schnitzler), and other related themes. Does it go back as far as the 1947 Maury Island Tacoma, Washington UFO affair and the discovered CIA operative Harold Crisman; a suspected worldwide pedophile ring that may have involved the murder to Jon Bennett Ramsey; the JFK assassination; the Candy Jones (Jessica Arline Wilcox) spy affair; M.K. Ultra-Manchurian Candidacy; Nazi technology; the 2008 Wall Street and financial crash and the enormous transfers of money?  When did it begin?   But more importantly, where is it leading?

Iamtheeyeinthesky OCTO ( httpwww.kylereviewseverything.commovie-reviewsmovie-spectre201657 ) download
Science-fiction Prophecy Come True
https://www.youtube.com/watch?v=WKcNO4uTe_c

Bell, Hall, and others, are inadvertently supported by theories and claims of researchers: Dr. Bernard J. Eastland, Dr. Nick Begich, James Bamford, John Marks, Gary Null, Marshall Thomas, Cathy O’Brian, Marshall D. Smith, Catherine Austin Fitts, and so many others.

As legitimate paranoia engulfs us, we are beginning to not to have visitors so often because we just do not know who the thieves are and who are not.

Finally, how do the investigators propose to handle that crushing wave – the tsunami — of deep and encrusted terror episodes – told, so very convincingly, in their “honest-to-God” stories and victimization’s (sandwiched along with lies and fiction) about their “Ghosts,” whatever “vintage” those phantoms and monsters might be?  I hope that person has a human micro-strainer.  

*******
Steve Erdmann, February 2018, St. Louis, Mo.
********
A New Breed Satellite Terrorism
Iamtheeyeinthesky Book Cover ( httpswww.barnesandnoble.comwa-new-breed-satellite-terrorism-john-hall1016514132 ) 9781606939444_p0_v1_s600x595
A New Breed Satellite Terrorism
https://www.barnesandnoble.com/w/a-new-breed-satellite-terrorism-john-hall/1016514132
********
Iamtheeyeintheskynrol67 ( httpswww.popularmechanics.comspacesatellitesg2728best-spy-mission-logos ) gallery-1470858058-8927263-orig
    BADGE  FOR  NROL-67     
https://www.popularmechanics.com/space/satellites/g2728/best-spy-mission-logos/
*******
Iamtheeyeintheskychart1 ( httpstargetedindividualinformationpackage.wordpress.com ) wp-14623114709071
https://targetedindividualinformationpackage.wordpress.com/
Iamtheeyeintheskychart2 ( httpstargetedindividualinformationpackage.wordpress.com ) wp-14623114644471
********
An Index of web sites concerning this article:
http://www.popularmechanics.com/space/satellites/g2728/best-spy-mission-logos/
https://gizmodo.com/watch-the-us-military-launch-a-super-secret-spy-satelli-1818718960
https://www.pixalytics.com/sats-orbiting-earth-2017/ 
http://tortureddaily.blogspot.com/2013/10/collection-of-targeted-individual.html
https://solari.com/blog/book-review-guinea-pigs-technologies-of-control/

See also:
Stan J. Caterbone
Advanced Media Group
scaterbone@live.com
http://www.amgglobalentertainmentgroup.com
http://www.advancedmediagroup.wordpress.com
http://www.scribd.com/amgroup01
http://www.facebook.com/scaterbone
http://www.mcvictimsworld.ning.com/profile/StanJCaterbone
http://www.youtube.com/advancedmediagroup.
*********
You can reach Steve Erdmann – at  –  dissenterdisinter@yahoo.com  – or  –  independenterdmann@gmail.com.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can friend him at:
Facebook – https://www.facebook.com/stephen.erdmann1 –
Or – visit the Dissenter/Disinter Group –  https://www.facebook.com/#!/groups/171577496293504/.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can also visit his articles at the following:
http://www.minds.com,
http://www.ufospotlightwordpress.com,
http://www.ufodigestblog.wordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/.
********
[1] Extremely low frequency (ELF) is the ITU designation for electromagnetic radiation (radio waves) with frequencies from 3 to 30 Hz, and corresponding wavelengths of 100,000 to 10,000 kilometers, respectively. In atmospheric science, an alternative definition is usually given, from 3 Hz to 3 kHz.
[2] Synthetic Telepathy is the process of hacking the human mind using a supercomputer and analyzing and deciphering a human being’s thoughts in real-time via their emanating brainwave frequency.

***********

Steve Erdmann – Independent Investigative Journalist

Another version of this article can be seen at:

I am the maker of rules – – https://wordpresscom507.wordpress.com/2020/06/07/

I’ll be Watching You!

Photos Extra House in woods ( httpamayodruid.blogspot.com201302crossroadsin-irish-folklore.html ) 393024_100313100145896_1543754325_n

Greer's Greatest Pilot Seeing UFO ( httpswww.pinterest.compin390265123937208763 )ae992abdb204251759013fe08a699131

Greer's Greatest Greys on Road ( httpsi.pinimg.comoriginals34dccf34dccfd2085f4c5f0240d705bc6c9116.jpg ) 34dccfd2085f4c5f0240d705bc6c9116

Greer's Greatest Disclosure Project ( httpswww.pinterest.compin24558760452707838 ) 32f14004d2aabb564061697e3e305ff5

https://www.youtube.com/watch?v=gbfwHGpo7RE

Greer’s Greatest UFO Query

By:

Steve Erdmann

Steve Erdmann, Copyright, 2018
Permission is given for reviewers and journalist to use small quotes with credit

Another version of this article can be seen at The Naked UFO Deep State – https://wordpresscom507.wordpress.com/2020/06/07/

Every Breath You Take

The Police
Every breath you take
Every move you make
Every bond you break
Every step you take
I’ll be watching you
Every single day
Every word you say
Every game you play
Every night you stay
I’ll be watching you
Oh can’t you see
You belong to me
My poor heart aches
With every step you take
Every move you make
Every vow you break
Every smile you fake
Every claim you stake
I’ll be watching you
Since you’ve gone I been lost without a trace
I dream at night I can only see your face
I look around but it’s you I can’t replace
I feel so cold and I long for your embrace
I keep crying baby, baby, please
Oh can’t you see
You belong to me
My poor heart aches
With every step you take
Every move you make
Every vow you break
Every smile you fake
Every claim you stake
I’ll be watching you
Ever.

“Every Breath You Take” is a song by English rock band The Police from their 1983 album Synchronicity. Written by Sting, the single was the biggest US and UK hit of 1983, topping the Billboard Hot 100 singles chart for eight weeks (the band’s only number-one hit on that chart), and the UK Singles Chart for four weeks. It also topped the Billboard Top Tracks chart for nine weeks…The song ranked number 84 on the Rolling Stone list of the 500 Greatest Songs of All Time and is included in The Rock and Roll Hall of Fame’s 500 Songs that Shaped Rock and Roll.  It also ranked number 25 on Billboard‘s Hot 100 All-Time Top Songs.  In 2015, the song was voted by the British public as the nation’s favorite 1980s number one in a poll for ITV.   Original sound recording made by A&M Records Ltd, © 1983 A&M Records Ltd, ℗ 1983 A&M Records Ltd. Made in England.
https://en.wikipedia.org/wiki/Every_Breath_You_Take.
The album’s title was inspired by Arthur Koestler‘s The Roots of CoincidenceSting was an avid reader of Koestler, and also named Ghost in the Machine after one of his works.

Greer's Greatest Ghost Machine ( httpsen.wikipedia.orgwikiThe_Ghost_in_the_Machine ) 220px-TheGhostInTheMachine
http://firdaus-9898.blogspot.com/2013/06/ghost-in-machine.html

Every Breath You Take
https://www.youtube.com/watch?v=OMOGaugKpzs

“We have given them names, but they have no relevance to what they call themselves. We simply call hem The Four Horsemen. These Horsemen work together at times, and they work against each other at times.  It is an on-going battle between them at a low level as to who is going to be top dog in the world. The one commonality to all four appears to be an absolute desire for control – of everything and everyone, and each of them has their own philosophy – the core root philosophy which guides them, supposedly, and their actions…They have their own unique flavor. But these people had agenda’s that were unlike any agendas you would have ever run into if you’re in the mainstream government.”

William John Pawelec, Unacknowledged, pp. 95, 96, 97. 

Steven M. Greer has spent many years investigating the various aspects of the “flying saucer” phenomena and has made inroads into alleged “whistle-blowers,” sensational aspects of UFOs, and those evil crevices where men in black suits and dangerous threats apparently exist and conjugate.

Amongst the menagerie of Orwellian intrigue, spies, secret projects, and government corruption, Greer treks through a graveyard of buried testimony and wearisome challenges to our present-day society.  Much of it threatens our sanity and social equilibrium.

(Unacknowledged, Steven M. Greer, M.D., A& M Publishing, L.L.C., www.AMPpublishing.com, West Palm Beach, Florida, 33411, 2017, 326 pages. $25.95.)

Greer develops vistas for readers, talking about more than 800 government, military and corporate witnesses and whistle-blowers he has interviewed, and also discloses the almost $100 billion spent from taxpayer monies in Unacknowledged Special Access Projects (USAPS), General Jimmy Doolittle’s talk of ‘interplanetary war,” the super-secret National Reconnaissance Organization (NRO), cosmic top secret clearance, the Alien Contact Intelligence Organization (ACIO), and the many references to crash and retrieved alien spacecraft.

Because the book covers a plethora of topics from spectacular UFO sightings to observations of “moon bases,” and all the heavy governmental secrecy sandwiched in between, it might be best to handle the topics under rough headlines trying to encapsulate those as typical examples.

Greer's Greatest Emblem ( httpwww.disclosureproject.org ) Sirius Poster No Signature
http://www.cdrg-australia.com/p/updates-from-dr-steven-m-greer-sirius.html

*******

https://www.youtube.com/watch?v=X_giV5sjNxY&feature=share.

*******

PART I

Typical Phenomenal UFO Cases

One ‘typical’ UFO case is cited by Don Phillips, U.S Air Force and contractor at Lockwood Skunkworks and the CIA. 

A sighting near Angel’s Peak at Nellis Air Force Base spoke of a “real solid object” seen on radar and which circled miles in seconds. Six to seven of these targets were tracked traveling 3,800 to 4,200 miles per hour, stopping on a dime, and eventually disappearing.  The operators were told neither to ask questions nor to deluge any information (pp. 36-37).

Graham Bethune was a Navy commander pilot with a top-secret clearance, also a VIP Plan Commander who flew high-ranking officers and personnel from Washington, D.C.

Bethune knew of several 1950 UFO sightings by the Air Transport Squadron near Keflavik, Iceland and also Argentina, Newfoundland, which demonstrated the erratic behavior.  A. L. Jones, plane commander, witnessed the UFO, a craft with a dome, that rushed from a mile away to about 10,000-feet from them, before disappearing. The Air Force interrogated the witnesses and classified the UFO “a good report.”   

Bethune also told about a Washington, D.C UFO. The object changed colors from yellow to orange and then to a pulsating red. The object appeared to be about 350-feet large and traveled anywhere from 1,000 to 2,000 miles an hour.  Radar said 1,800 miles per hour, covering 15 miles in a second or two.   It was reported that canine Bird Dogs acted up and that directional gyros also acted up when the UFO was near.  Colonel Watson of the Wright-Patterson AFB said the radar reports disappeared (pp.38-41).

John Callahan, former Division Chief of the Accidents and Investigations Branch of the FAA in Washington, D.C., told of a UFO at 35,000-feet that chased a 747 aircraft across the Alaskan skies for about thirty minutes. Radar detected it. At eleven o’clock position, a pilot saw it as a huge ball with lights running around it. The object, which was four times the size of the 747, moved erratically.

The matter ended up with the secretive Scientific Study Group, with the CIA threatened to silence Callahan.  Callahan held back some records in defiance.  The pilot was forced to take a desk job and was often humiliated about his UFO sighting (pp. 108-113).

Callahan was aware of another disc-type craft in the Briarwood Lake near Medford, New Jersey: lights at the top and bottom, and a dome on top, about five-hundred-yards across, the UFO  was seen coming from the lake, water was seen rushing off the object.  The UFO was recorded in the navigator’s log.

SHOT UFO OCCUPANT

Major George A. Filer, III, worked as the Deputy Director of Intelligence for the 21st Air Force and has flown over three hundred aircraft. Filer talked about a January 18, 1978, UFO sighting on the McGuire Air Force Base. The UFO appeared through the night, showing red light as it hovered over the runway, and then, apparently having crashed and/or landed at Fort Dix, an occupant became shot and killed while trying to escape. AC-141 was called to pick up the occupant remains.  Filer wasn’t allowed to see the photos about the incident, while he was, indeed, there while they were being passed around to those being debriefed. Six to eight people eventually “guarded” the body; they were dislocated from each other so that their associations couldn’t be established.

Robert Jacobs, former Lieutenant in the U.S Air Force, as well as a respected professor at a University, was in charge of optical instrumentation in the 1369th Photo Squadron at Vandenberg Air Force Base in California where he was supervising photographic instrumentation during ballistic missile tests.

In 1964, he said, there was tracking of a “dummy nuke” test using a M45 racking mount with a 180-inch lens, when suddenly a circular-shaped object (“like two saucers cupped together with a ping-pong ball on top”) flew into a frame showing the object shooting “beams of light” at the missile’s warhead. Both, the missile and the object were flying at “several thousand miles an hour.”

Jacobs said that Major Florence J. Mansmann at the First Strategic Aerospace Division headquarters ordered him to ‘complete silence,’ warning him of dire consequences if he ever spoke about the incident. “I was never to speak of this again,” said Jacobs, “as far as I was concerned, this never happened.”   Jacobs explained that strange “guys” in civilian clothes came and spooled off part of the film with the UFO on it and confiscated that section. 

Jacobs revealed that he was harassed at work, and received strange phone calls day and night; one caller said to him: “You are going down, mother fucker!”  Once, Jacobs found skyrockets in his box.  These harassments continued on till about 1982 (pp. 183-186).  

Merle Shane McDow was in the U.S Navy Atlantic Command in May 1981 and had a Top-Secret Special Compartmented Intelligence (SCI) clearance, and he carried a Zebra Stripe Badge.  During May of 1981, McDow was aboard the U.S. American, and it was his job to make sure any incoming and outgoing audio/video information that came into the Command Center was recorded and officially logged. 

A UFO had come into their airspace, setting off a Condition Zebra, and only those with a Zebra Access Badge could remain in the Command Facility.  Admiral Harry Trane was alerted to the Command Center, and it was quickly verified that the UFO was not the Soviets.  Trane sent out two planes to investigate the UFO; futile chases of the UFO began up and down the seaboard. Planes were summoned as far north as Greenland.  McDow could hear pilot-conversations. And the UFO appeared on the radar for almost an hour. The UFO demonstrated very erratic flight patterns “up and down the coasts,” as if playing tag.  The K11-11 spy satellite could only get an early glimpse.

The Admiral’s frustration was centered on the fact that “this thing” had complete and total control, and the witnesses were frightened and upset. Trane was “scrambling” planes left and right along the entire seaboard “to cut this thing off.”  Eventually, the UFO left the atmosphere into space.

The object traveled “thousands of miles in a blink of an eye,” and had complete control of the situation.  McDow was “debriefed” afterward and he was told in no uncertain terms to never speak about it again.  “It didn’t happen,” two guys in suits told him (pp. 191-196).

PART II

Close Encounters of the 3rd and 4th Kinds

While there were several government ‘whistle-blowers” in the topic of meeting the occupants of UFOs, I will trace only some typical informants that Greer talks about.

Richard Doty, a Special Agent for counterintelligence in the Air Force Office of Special Investigations (AFOSI), is quoted often throughout Greer’s book. Doty, unfortunately, has been called into question by suspicious UFO researchers who feel Doty has used disinformation, but the strong evidence is not available, and Doty’s rank leaves that open to question.

Greer's Greatest Doty ( httpsnoriohayakawa.wordpress.com20150831did-richard-c-doty-ruin-the-life-of-albuquerque-businessman-paul-bennewitz-2 ) doty
http://www.theufochronicles.com/2017/11/ufo-disinformation-agent-richard-doty.html

Doty spoke of various UFO crashes and retrieval in Corona, New Mexico, Horse Mesa west of Magdalena, New Mexico, and similar crashes ranging from June 1947 to 1949 where alien bodies were put into “deep freeze” at Wright-Patterson Air Force field in Dayton, Ohio.

The entities were usually about four-foot tall, no ears, nude-body-looking-type suites, no thumbs, and four fingers with suction devices on tips.  The entities appeared to have a “head apparatus.” The entities also appeared to have several stomachs for different functions. Doty said there were eleven different lobes in their brains.  A live, captured “creature” went to various military bases, including Fort Detrick, Huntsville Redstone Arsenal, and others. 

W.H is a whistle-blower identified as a Tech Sergeant that served in the U.S Air Force from 1963 through 1977. He said that he had the opportunity to view a retrieved craft at Dayton, Ohio in the “Blue Hanger” where several such alien craft were housed.   Debriefing officials informed him that over a hundred alien craft retrievals occurred in New Mexico, four corners area, because of American “radar” had caused them to crash. 

The alien crafts were usually saucer-shaped, aluminum in color, and seamless. Later, W.H was driven to a box canyon in a contingency of high-ranking naval officers and civilian engineers and scientists (Project Mercury) to witness a similar alien craft with two alien beings.

The “Graylings” had large eyes, slim mouth, long slim arms and hands, slim bodies, and were wearing one-piece flight suits. W.H said that It was a two-hour meeting and encounter. A very similar convention was held in Hawaii at Kauai, called Project X.   A CIA friend of W.H, Wesley Bond, had extensive files concerning all related UFO activity, and Bond said he was ready to disclose his files: he was subsequently murdered and his files disappeared.

One of the most controversial, and increasingly criticized ‘whistle-blower’ is Bentwater’s security officer Larry Warren, who claimed to be another witness and participant to the famous Rendlesham-Bentwaters ‘contactee’ case of December 1980 where a host of trained military observers encountered a series of acrobatic UFOs, with one landed, being observed, handled and having left physical traces before taking off. Warren claimed to have been one witness who has a complex story of participation, harassment, and conflict. At one point, Warren claimed to have seen three child-size people cocooned in the light. These were witnessed by others. Greer quotes Warren at length (pp. 131-145). 

Greer's Greatest Warren Humanoids ( httpbadufos.blogspot.com201507the-rendle-sham-case-phony-and-phonier.html ) LarryWarrenAliensCNN
Larry Warren saw Humanoids
http://badufos.blogspot.com/2015/07/the-rendle-sham-case-phony-and-phonier.html.

Marine Lance Corporal John Weygandt was a U.S Marine security guard of a second marine air wing 28th Marine Air Control Group, Second air defense battalion troop of North Carolina that had been stationed in Peru. 

Sergeants Allen and Atkins came alerting the crew that some unknown aircraft had crashed and that they needed to investigate. A patrol headed to the site about 6:30 a.m. and upon arriving discovered a huge ship had created a gash in the land.  The area was burnt as if by laser-energy, and the object was buried in the side of a cliff. The craft was oozing a greenish-purple “syrup-like liquid,” as if alive and changing color in shades. 

A light revolved on the craft, said Weygandt, and he could hear a deep, bass hum. Eventually, everything cut off and stopped.  He could see what happened to be “vents” or “gills” on the back. Weygandt discovered that the “syrup-like” substance could eat his clothes as if some form of “acid.” The object appeared to be twenty meters in length, teardrop-shaped and looked very aerodynamic.

Weygandt had the distinct impression that an occupant was trying to contact him by telepathy.

Surprised, Weyandt and the sergeants were arrested, cursed and harassed by Department of Energy people, as well as by “men in black Cammie’s” with no name tags.  Older men appeared wearing containment suites.

Weygandt was handcuffed, his legs fastened, and he was placed in a 47 Chinook helicopter–then taken to be debriefed and harassed for two days. (Greer does not disclose dates, pp.157-160).

Some of the cases Greer discusses, for all intent and purposes, concerning hidden alien and government operations on the Moon as well as the “doctoring” of photos related to this. Greer tells about Donna Harre who worked in the NASA and contracted to Philco Ford from 1970-1971. She worked in Building 8, under a high secret clearance, where she inspected photographic mosaic panels of satellite aerial shots.

Greer's Greatest ( httpssteemit.comnews@an0nkn0wledgethe-origins-and-50-years-of-evidence-of-a-secret-space-program ) U5du8FLAFHoyjP2nTNYArh4spQGTDqf_1680x8400
Hidden Objects on Moon
https://pics-about-space.com/project-horizon-moon-base?p=3#img3399138793069924095

Occasionally, Hare said, they would come across curious sharp lines and round shadows alluding to UFOs that she was told to airbrush them out of the photograph. Hare said that people involved in the scrubbing or deletion of UFO photos or similar photos of the moon shots always felt threatened. Lunar astronauts, likewise, have been involved in knowing ET’s had landed on the Moon as part of Operation Santa Claus.  People and evidence have disappeared, Hare said. “One particular man I know of, who just disappeared off the face of the Earth.”

PART III

Various deep shades
The Government Deep State and the Military-Industrial-Corporate-Complex-Matrix (MICCM)

A large part of Greer’s work and the book is devoted to actual and suspected government Deep State control and descriptions of what President Eisenhower called the Military-Industrial-Complex. Greer announces over 800 government, military and corporate “whistle-blowers” in his Project Disclosure that reveals the reality of up to $100 billion annually into Unacknowledged Special Access Projects (USAPS).

“If this sounds like an Orwellian nightmare, it gets worse, for the final act that they (the human cabal),” says Greer, “have in store is a False Flag event that will make 9/11 look like a fender bender.”

Greer's Greatest Man in hanger with UFO ( httplistverse.com2018012410-supposed-secret-space-program-insiders ) iStock-177708187
Special  Access Projects
http://listverse.com/2018/01/24/10-supposed-secret-space-program-insiders/

Several of Greer’s whistle-blowers (such as Dan Morris, a retired Air Force Master Sergeant, belonged to a super-secret National Reconnaissance Organization [NRO]), held a cosmic top-secret clearance, which is 38 levels above top-secret, that even U.S presidents do not hold.

Subsequently, when alien crafts were retrieved and contact had been made, an Alien Contact Intelligence Organization (ACIO) was established.  

Whistle-blower sergeant Clifford Stone, worked with the 462nd Air Intelligence Secret Squadron, helped retrieve crashed ET crafts, worked in Operation Blue Fly and Project Moon Dust, and said there were “eleven” classifications above Confidential, Secret, and Top Secret, and even “above and beyond” normal Special Access Programs.

Stone went on to explain that the National Security Reconnaissance Office, just like the National Security Agency, was secret for many years and was not mentioned in the public domain.  Full knowledge about UFO programs, said Stone, was limited to a small number of people, actually being Special Access Programs within Special Access Programs, and they are almost uncontrollable (pp. 30-33).

THE WILLIAM JOHN PAWELEC STORY
Pawelec and the Controllers

William John Pawelec was an intriguing whistle-blower who, like so many capable professionals that found themselves, sometimes unexpectedly and with no real preparation and defense, face to face with an enemy that was as treacherous as they were invisible.

Greer's Greatest Photo of Pawelec ( httpwww.unacknowledged.infowilliam-pawelec-says-four-power-groups-control-the-world ) William-Pawelec
John Pawelec
http://projectavalon.net/forum4/showthread.php?26336-William-Pawelec-s-widow-reveals-national-security-secrets

Pawelec had been a computer operation and programming specialist in the Air Force in the mid-1960s, first at Pope Air Force Base and then in Vietnam. He left the military and went to work for Rosco Electronics, one of the largest manufacturers and installers of access control equipment in the world, and then proceeded into the military once again, allowing him to regain a security clearance. He did a lot of work for the State Department developing security systems for national security, and also for large corporate systems, and later for SAIC and TRI-COR.   

In 1973, Pawelec was developing implantable chips in North Glen, Colorado, as it was then used in hypodermic injections to horses. Pawelec was aware through naval offices that there were discussions of developing tracking devices to follow necessary targets; Pawelec mentioned the case in Europe where the Prime Minister of Italy was kidnapped, drained of sensitive information, brutalized, or both. It was speculated by officials that a technology is developed allowing authorities “to track these people or locate them quickly.”

This whole topic was the basis of a meeting set-up at a Secure Communications Intelligence-Information Facility (SCIF). Pawlec’s friend “Bob” (who had intimate contacts in the CIA) took no quiet action to investigate two ‘mystery men’ that snuck into the meeting and began probing the meeting leaders with questions. They claimed to be from the Department of Agriculture and the Department of the Treasury.  The ‘mystery men’ wanted to know how a couple billion of the implants could be manufactured, with unique identity numbers, have flexibility monitoring temperature, blood pressure, pulse, and even waveforms of the brains,

Such a chip was removed from a lady in 1999, and when it was removed and examined closely, resembled somewhat a version of the chip used in Denver.  She supposed the chip had been implanted either in 1980 or 1981.

Pawelec said the gentleman who invented the chip “was very wealthy and abruptly had passed the technology”: “Somebody else took it and ran with it and we never knew who it was.”

In 1984, the University of New South Wales had a microscopic lithium Niobite chip, and experiments showed it was viable and could send and receive as an RF transmitter.  The professor who did this work was sent to talk to Pawelec’s Systems Group of Colorado for further experiments.

A meeting was set-up in Virginia at a subcontractor’s company; people, like the Director of Security at the State Department, and, again ‘mysteries men’ came, carrying credentials. The ‘mystery men’ knew all the details about time, place and topic of the meeting.  Pawelec felt this somehow had a connection with his knowing the Head of Security at the State Department because Pawelec had designed that man’s security systems for Mainstay, the headquarter in Foggy Bottom in D.C.   

Because of these meetings, the professor at the University of New South Wales received a giant grant, and later the technology was transferred. A friend that Pawelec had in San Francisco (who was involved in tracking people and National Security, doing FAB-Access and other related devices in a European electronics firm of Siemens) said his company was “making billions of these chips” that strikingly resembled the Pawelec chip.  A year later, the company closed down and the chips disappeared.

Bob and Pawelec continued to investigate. Bob contacted his CIA connections and asked additional questions. A few days late, Bob was hit by a reinforced Land Rover and killed instantly. The driver of the Rover was hospitalized and immediately disappeared: all of his information that he gave was phony.  “It was a hit,” said Pawelec.

The two ‘mystery men’ who had come to the meetings had NSA, NRO credentials that could even pass all access control mechanisms, said Pawelec; however, they later checked, and discovered the individuals “didn’t exist.”  It meant they had unlimited budgets supporting their ventures. 

Pawelec knew about aerospace companies that were doing security work beyond black or even “darker.”  He named Northrop and plant 29.

The gentleman Pawelec met from the Department of Agriculture asked many cold, apolitical questions about chips, their ‘speed’ by which they could be produced, the frequency they could be built, various implant “attributes,” and much more.

“I believe there are at least four power groups in the world,” said Pawelec, “they have taken over various programs-particularly black programs within our government, and probably even the Russian government, and the Chinese. Politics to them, as we know it, is not the same. They have agendas totally unlike what our government…unbelievably, they are able to track everything going on around them, at the minutiae level,” (pp. 90 -98). 

All Pawelec’s files on this matter were withheld until his death, and his wife had been given instructions to disclose them.

A CRIMINAL ENTERPRISE

Steven Greer points to the creation of Majestic-12, a Black Project headed by noted scientists and high-ranking intelligence officials, such as Admiral Arthur Redford, Chairman of the Joint Chiefs of Staff, and Charles E. Wilson, Secretary of Defense, the Black Project probably prompted by the 1947 Roswell crash and other crashes.  Greer, having gained insights from his friends in the various “alphabet” and ‘high industry’ groups, says that MJ-12 is now known as SECOR, MAJIC, P.I 40, and MAJI-The Majority Intelligence Committee. Greer says MAJI – Control is part of the Office of Naval Intelligence, similar to the NSA and the CIA. “It’s all very, very similar to the NSA and CIA…very, very top-secret,” says Greer, and he explained in further detail: “Essentially, the covert management of this matter operates as part super-secret organized crime operation. It is more like a secret mafia than a government entity…extra-constitutional, both in the U.S and the U.K, as well as other countries…a criminal enterprise and a conspiracy of the first order…assassinations, murder, kidnapping, theft of technology…spin-off technologies based on the study of ET objects…”   (pp. 55-57)  

Greer's Greatest Raging Monster ( httpnewgameplus.com.brantes-tarde-do-que-nunca-outlast ) Outlast-1-1560x950_c
“It is more like a secret mafia than a government entity.”
https://www.pcgamer.com/outlast-preview/

“Greed and control (are) easily understood; the bureaucratic inertia of large secret operations is yet another matter,” says Greer. “After decades of operations, lies, public deceptions, and worse, how does such a group unravel all the webs it has weaved…a Specter of a sort of cosmic Watergate?”  (p. 82)

Photos Extra Wringing ( httpswww.pinterest.comOwnYourCountrylibertarian ) 9d82ac310b8b143d0e315a22636541fc--political-economy-political-art
http://yumysgalaxy.blogspot.com/2013/03/capitalismo-perverso.html

Greer’s book, heavily indexed with photos and documents, is a plethora of facts and conjecture, running from descriptions of Area 51 to Greer’s unveiling of his own Disclosure Project and his Center or the Study of Extra-Terrestrial Intelligence (CSETI) — discourse on the differences between ETV’s (Extraterrestrial Vehicles) and ARV’s (Alien Reproduction Vehicles) as “man-made” advanced anti-gravity craft that look like a “UFO.” There are additional disclosures of Greer’s meeting with famous dignitaries and their clandestine information, threaded alongside many assorted and quizzical paranormal incidents that would probably promote the reader’s skepticism and wonderment at times.  

There were many so-called “whistle-blowers” not mentioned in Greer’s approximate 800, such as the Bob Lazar story (some more reputable; some not). We have added an index that mentions additional information on those, but also the topic of the Hidden Intelligence controllers that are somehow involved.  When facts seem to contradict, one needs to look at the underlying patterns, connect the dots, and do your own private investigation and not just wait for the silver-platter to be handed to you.

OLYMPUS DIGITAL CAMERA
OLYMPUS DIGITAL CAMERA
White-blower Bob Lazar
https://utahufofest.org/2017-fest/

Still puzzling questions need to be asked of Greer, his associates, and the whistle-blowers:

For the interstellar technology that should have evolved into ‘fail-safe’ operation, why do ET vehicles still crash, and does human ‘radar’ technology still affect its capabilities, and why?

And how do these seeming ‘regular’ spaceships stand up against reports of more ‘ethereal’ ETs that operate almost as ‘spirits,’ and, as Steve Erdmann has questioned in the past, why do billion-mile-space-travelers even need ‘machines’ to travel the vast distances?

https://wordpresscom507.wordpress.com/2017/07/19/ufo-perspectives/

Why the wide variety and diversity of spacecraft design seen in retrievals, it should raise some suspicion and concern in that much differentially could be unwarranted to those degrees?

https://wordpresscom507.wordpress.com/2017/07/01/ghost-busting-ufos/

And where is the depository for to the answers to all these questions?

These conundrums need to be addressed and answered, for certainly the world of UFOs still continued to be filled with unending mystery.

As always, I’ll be questioning, investigating.  I’ll also be waiting.

*******

Photos Extra Brando ( httpsgiphy.comgifshorror-now-apocalypse-t8vI9EexNVS24 ) NDO20170501_horror1
https://giphy.com/gifs/horror-now-apocalypse-t8vI9EexNVS24

*******

Greer's Greatest Picture of Greer ( httpsen.wikipedia.orgwikiSteven_M._Greer ) 220px-StevenGreer01
Steven  M. Greer
http://transformationparadigm.com/featured-presenters/dr-steven-greer-md

*******
Steve Erdmann, February 2018, St. Louis
*******
You can reach Steve Erdmann – at – dissenterdisinter@yahoo.com  – or –  independenterdmann@gmail.com.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can friend him at:
Facebook – https://www.facebook.com/stephen.erdmann1 –
Or – visit the Dissenter/Disinter Group – https://www.facebook.com/#!/groups/171577496293504/.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can also visit his articles at the following:
http://www.minds.com,
http://www.ufospotlightwordpress.com,
http://www.ufodigestblog.wordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/.

*******

Additional sites on these topics: we do ‘not’ endorse any one site in its totality, but have found that eventually bits and pieces come together to make the underlying historical picture “jell” (and these are only a minute selection of so many out there):

https://www.nationalgeographic.com/magazine/2018/02/surveillance-watching-you/
https://www.zerohedge.com/news/2017-01-17/56-years-ago-today-eisenhower-warned-americans-unwarranted-influence-deep-state
https://theintercept.com/2014/02/24/jtrig-manipulation/
https://www.youtube.com/watch?v=Fh2_3WFEqYA&feature=share
http://www.dailymail.co.uk/news/article-2573193/Flying-saucer-focus-seagull-taking-poo-Slides-Snowdens-latest-leak-fake-UFO-images-used-deliberately-spread-misinformation-online-claims-expert.html
http://subversify.com/2011/10/14/cracking-the-matrix-our-militaryindustrial-spy-services/
http://talkingtree.org/bob-lazar-area-51-whistleblower/
http://www.extraordinarybeliefs.com/news/2015/5/29/corbell-public-response-about-bob-lazar
http://www.unacknowledged.info/william-pawelec-says-four-power-groups-control-the-world/
https://www.youtube.com/watch?v=6P5by1hq5sw
https://www.youtube.com/watch?v=3-cpcoHinsY
https://www.youtube.com/watch?v=pNJph3d5zak
https://www.youtube.com/watch?v=d1tr1MoxSMA&list=LLjil42P1nRuoZQtdAMl2U3Q&index=4
https://www.wanttoknow.info/mindcontrolnewsarticles
https://martinacable99.wordpress.com/2012/11/04/targeted-individuals-psychotronics-anonymous/

*******

I’ll Be Watching You
*******
Photos Extra Steve1 34934490_10156520897824595_8244253719684710400_n

Steve Erdmann – Independent Investigative Journalist

Another version of this article can be seen at The Naked UFO Deep State – https://wordpresscom507.wordpress.com/2020/06/07/

Bringing Down the Towers!

Farrell's Redux Photos ( httpswww.anmysite.comtopwallpaper-nazi-ss.html ) 38884494-nazi-wallpapers
Farrell's Redux Photos Redux ( httpswww.zerohedge.comnews2017-10-29how-elite-dominate-world--part-5-endgame-complete-and-utter-global-domination ) 20171029_nwo

Photos Extra Nazi Wing ( httpwww.darkroastedblend.com200904wonder-weapons-of-world-war-two.html ) truketyjtrhdgbf

A FANTASTIC TRILOGY OF FARRELL’S FUMAROLE FOLKLORE

By:

Steve Erdmann

Redux
This article was previously published in the December 2017 issue of Alternate Perception Magazine, and is being reproduced with permission.   Editor Brent Raynes has been the editor since 1985 and has done extensive investigation into  paranormal topics.  He is author of  Visitors from Hidden Realms (2014).
http://www.apmagazine.info
A Fantastic Trilogy of Farrell’s Fumarole Folklore
http://apmagazine.info/index.php?option=com_content&view=article&id=1069&Itemid=256

Another version of this article can be seen at Joseph Farrell’s Nazi Trilogy Redux – https://wordpresscom507.wordpress.com/2020/06/07/

(Harry Cooper-Sharkhunter – Bariloche near Stadt)  “…according to people Cooper interviewed, General Eisenhower even visited the hotel sometime during or around 1954…was Eisenhower being ‘vetted’ for his suitability as a presidential candidate by this group, in a Bohemian Grove or Bilderberg Group style meeting? Or was Eisenhower being told ‘the way things really are’?…Eisenhower may not have been talking solely about the American military-industrial complex at all…the Nazi international was not only alive and well, but well-equipped, well organized, and self-evidently well-funded.”  (Nazi International, pp. 301302.)

“It was to be an expansion, on a far grander scale of the previous machinations of the Dawes and Young Plans that led to the creation of the I.G. Farben in the first place. Negotiate, penetrate, infiltrate, and cartelize all transfers of technology, with Germany and the Party interest solidly at the core; these were the watchwords of Borman’s emerging Nazi International.”  (Nazi International, p. 73.)

(Nazi International: The Nazi’s Postwar Plan to Control Finance, Conflict, Physics and Space, Joseph P. Farrell, Adventures Unlimited Press, One Adventure Place, Kempton, Illinois 60946, www.adventuresunlimitedpress.com, 2008, 413 pages, $19.95.)

****

“…the finance of terrorism is, one, synthetic and, two, so large that terrorist ‘finance’ is extricable woven into the financial structure to the extent that amend to the war on terror could only come about with an end to the current global financial system.”  (Covert  Wars, p. 164)

“What we have now discovered is a vast-covert-operations slush fund, a hidden fund, involving billions of dollars in securities and stolen and re-hypothetical bullion, one based upon permanence or semi-permanence, in keeping with the total culture of total power not billions (but probably)…is in trillions.” (Covet Wars, p. 210)

(Covert Wars and Breakaway Civilizations, Joseph P. Farrell, Adventures Unlimited Press, One Adventure Place, Kempton, Illinois 60946, www.adventureunlimitedpress.com, 2012, 371 pages, $19.95.) 

****

“That financial alliance came about as a result of bargains struck with the former Axis elite after World War Two, to gain access to a vast supply of loot, loot which could be kept off the books, and fuel an enormous postwar expansion of secret in-structure, the development of black, exotic technologies, and covert operation…knew the practices of the occult, and sacrifice, very well…” (Hidden Finance, p. 258.)

“…a ‘breakaway civilization’ that secretly emerged because of its decades’-long access to secret funds…exploitation of Axis loot…vast war chest to fund the secret development of various exotic technologies…Nazi organizations, with it s own deep ties to the criminal underworld, drug trafficking, and, of course, to Islamic radicalism and terrorism.”  (Hidden Finance, p. xxx)

(Hidden Finance, Rogue Networks and Secret Sorcery: The Fascist International, 9/11, and Penetrated Operations, Joseph P. Farrell, Adventures Unlimited Press, One Adventure Place, Kempton, Illinois 60946, www.adventureunlimitedpress.com, 2016, 269 pages, $19.95.)

A Secret of Great Magnitude

Joseph Ferrell is certainly a foremost investigator into paranormal and esoteric subjects, having written numerous books on conspiracy, UFOs, and things largely mysterious. In the trilogy of the books mentioned within this article, Ferrell outlines the continuance of a global elite after World War II, how it built a hidden economy of vast proportions, and then exerted its power and technical ability in the destruction of the Twin Towers on 9/11.

PART I
Extraterritorial Nazi State

Ferrell tells of plans of the Third Nazi Reich to survive the war and continue as a clandestine Fourth Reich, a postwar Nazi International, continuing to develop their “most advanced technology.” Dr. Carol Rosin, a long-time American associate of Nazi Operation Paperclip rocket scientist Werhner von Braun, was allegedly told by Von Braun prior to his death in 1973, “that the world’s elite had a long-range plan for the control and manipulation of the population in response to various ‘perceived enemies.’’’ (Nazi International, p. 41)

Farrell's Redux Photos ( httpswww.anmysite.comtopwallpaper-nazi-ss.html ) 38884494-nazi-wallpapers
A Long-range Plan to Control
https://www.cineserie.com/movies/432850/

This geopolitical agenda was to create a third bloc of nations, including two superpowers, in conjunction with the creation of an extra territory Nazistate,’ the long-term goal was World Corporate Socialism. Special licensing arrangements emerged between the Western Powers, the United States, and Germany, resulting in an international corporate cartel.

Hitler’s first Reich bank president, Dr. Hjaimar Horce Greeley Schacht, typified the “pattern of incestuous relationship” between the American corporate elites and Germany. It existed in Morgan Stanley elites and Germany.   It existed in Morgan Stanley and Standard Oil investments of millions of dollars American I.G. Chemical, Du Pont, Alcom, Dow Chemical, and the growth of German I.G. Farben.

Prescott Bush’s business dealing s with German Fritz Thyssen, and other such dealings enabled Nazi Party Reichsleiter Martin Bormann, following the I.G. Farben’s models of expansion to safe havens abroad, an option codenamed Akton Feuerland, Operation Fireland.   Such an operation utilized underground vaults, as well as U-boats to connect with the far reaches of Argentina. In 1942, Bormann’s Project Bernhard created $600,000,000 of counterfeit British pound notes. 

“Bormann, in short, was a professional Nazi, aiming to maintain the Party, its power, and agenda and to give its institutions and goals permanence.” (Nazi International, p. 67) 

Bormann’s “Auslands-Organization” expanded from a watchful eye on German’s “Fifth Column Network” into an “extensive industrial espionage” cabal as outlined by Obergruppenfurher  Dr. Johann Friedrich Scheid in a secret conference that included major firms of great importance connecting many American companies as far as Spain and South America.

Bormann worked with the likes of Allen Dulles and German military intelligence Chief General Reinhard Gehlen and a “nominal CIA control” over-shadowed by Nazi Germany’s “military intelligence.”  It was collusion with the United States government.  (p. 80)

Corporate Fifth Columns

The new Nazi cabal worked in massive amounts of false fronts, dummy corporations, fifth columns, vast networks of finance agents and lawyers, extending to John D. Rockefeller or J.P. Morgan, a “Nazi International to conduct not only espionage but research in its own right…connected to the Party in the surface, but deeply connected to it covertly.”  (p. 82)

(Stalin, the Russian leader, said Bormann escaped in a fleeing U-boat.)

Ssobergruppenfuhrer Dr. Ing Hans Kammler, similarly, headed a think tank, harboring German secret weapons research and a slave labor pool of about 14 million people. Bormann exerted hidden and hard control in bargaining with his American counterparts, forcing them cover and camouflaged dummy corporations and protection of secret plans. This included secret weapons such as “The Bell.”

Massive amounts of liquid capital and assets were transferred to hide-outs for both: funds, and, Nazi personnel to Latin America, the Middle East, Spain, ‘black’ U-boats, pro-Nazi factories, and “various puppet governments of Europe.” Farrell indicates alliances were made as far as postwar radical Islam.  “…probable shadowy connections between the Nazi International and Al-Hussein.”  (p. 191)

A peculiar relationship existed between German military intelligence mastermind Richard Gehlen and Allen Dulles, brother of John Foster Dulles of the lawyers involved in the eventual forming of the Central Intelligence Agency (CIA).

Ferrell gives concern to the rise of pro-Nazi sympathy about the globe, such as in Arabia, Egypt, Italy, Turkey and other places (pp. 193-200).

A significant mystery was German intelligence agent Andreas Strassmeir who was loaned to the U.S as an undercover agent. Strassmeir, according to several witnesses, was seen in the company of Oklahoma bomber Timothy McVeigh. When Strassmeir was arrested in a roadblock, every effort was made to obtain his release, including the deployment of a German GSG-9 security force.

While in America, Strassmeir associated with white supremacy religious groups in Oklahoma and underground Neo-Nazi groups, often giving training in survival tactics and guerrilla operations.

Continued Reunification and New Directions

Neo-Fascist and radically Rightwing Nationalist groups grew throughout Eastern Europe, a mix of socialism and capitalism. Dissemination was created through a Neo-Nazi computer network called the Thule network. What was emerging was Hegalian East German Third Position Reform. Martin Bormann’s Nazi International “was alive, well, and able to mount a coordinated effort…still well-organized, well-financed…”  (pp. 224-225)

One of the areas in which Neo-Nazism appeared was the use of double intelligence agents, made into triple agents operating from a “third position.” This was clearly in line with Gehlen’s spy organization and its nefarious link to Allen Dulles and the early CIA. Gehlen and his bundesnachrichtendienst were an integral part in Bormann’s Nazi International design to smuggle Nazi personnel to safe havens in Latin America and the Middle East. 

Roots of a two-pronged Nazi Monster began in the arenas of science (with scientists such as Cornelius Jan Bakker, a leading nuclear physicist working on Huemul Island) and Prince Bernhard of the Netherlands, who was a founder of the mysterious Bilderberger Group (Bernhard was a former Nazi SS soldier/employee of I. G. Farben, officer in Butch Oil) as the political prong. These two tools can be traced through the years:

# I.G. Farben’s exotic technology existed at their laser isotope enrichment facility, the Bariloche fusion project.    

# Argentina’s Juan Peron announced that his Nazi contingent had by-passed fission power and had gone to fusion power.

# German scientist Ronald W. Richter was very advanced in shock wave research, The Atomic Bomb Project, which included high-spin atomic nuclei, levitation, a torsion bomb, space-time energies, and “The Bell.”

# General Reinhard Gehlen effectively took over American intelligence as his “network,” poisoned the CIA’s civilian character and became a “network of the Nazis.”   Robert H. Jackson,

U.S. chief prosecutor at the Nuremberg trials and President Harry Truman knew of the penetration of the CIA.

# J.P. Morgan and also Nelson Rockefeller were paying big dividends to Bormann through American banks as late as 1967.

# German scientists under Walther Gerlach and Kurt Drehner experimented with deuterium and high explosive-driven convergent shockwaves—weaponization far beyond atomic or hydrogen bombs. Dr. Jose’ A. Balseiro spoke of the use of magnetic field production on Lithium-7 through radio frequency generators.

Wolfenstein® II: The New Colossus™_20171030193230
Wolfenstein® II: The New Colossus™_20171030193230
Secret Experiments Led to a New Direction

Farrell cites researchers Richard Hoagland and Mike Bara’s Dark Mission which outlined the deep occult and esoteric traditions that the so-called Fourth Reich still operated under, clearly connected to Hitler’s and the Third Reich’s heritage.

Nazi Occultism, Hidden Space Program, and Esoteric Symbolism

Operation Paper-Clip was an intrinsic part of the new Reich into America, though those scientists were mainly inducted into the U.S space program. The authors said such programs were programs secretly advanced behind the scenes.

One such mysterious inconsistency of such a Hidden Enterprise revolves around why Apollo 10 didn’t take place. The reasons are traceable back to the further penetration of Nazism in America and also their occult practices.

Apollo 10 did not fulfill some hidden requirements of an Egyptian agenda of a very deep level of planning—lunar landings had been on the 20th of April (1967 and 1972) which was Adolf Hitler’s birthday. The Nazis believed they could be traced back to the Aryan race and the colonization of Sumer and Egypt. 

Other mysterious connections surrounded Carlos Miguel Allende and his letters to Dr. Morris Jessup (1955-1958) which spoke of the Philadelphia Experiment and Albert Einstein’s Unified Field theory, anti-gravity, and cosmic war. A Varo edition told about Wernher von Braun connections to German physicist Burkhardt Herm. Herm visualized a sixth-dimensional spinoriented fullquantized theory of spacetime.

Near 1970, the Torbitt Document alleged that the involvement of Wernher von Braun into the Kennedy Assassination. It was New Orleans District Attorney Jim Garrison, however, that in 1967 uncovered many Nazi connections behind the assassination. Clay Shaw, a major player, “vetted Paper Clip Nazis.” 

A Vast System of Operation

In a Hotel Maison Rouge meeting in Strasbourg, France, Bormann carried out Hitler’s desire “to create a vast system of dummy and front corporations to evacuate liquid assets, crucial scientific and technical personnel, and actual technology outside the Reich…gain power over as much of the world by whatever means possible, and hold onto it…much like the pronouncements, one hears coming from the global corporate elite today…”  (pp. 390-391)

When the Lunar Excursion Module landed on the moon on July 20, 1969, the announcement was: The Eagle has landed. But Farrell interprets this differently: “It was someone else’s eagle___one with a Swastika surrounded by oak leaves clutched in talons___that had filed the flight plan.”

Part II

In Farrell’s Covert Wars and Breakaway Civilizations tome, Farrell expands his overriding thesis that a post-war Fourth Reich continued and knew about an immense multi-billion-dollar “slush fund” of counterfeit currency, often referred to as gold bonds, but might also be encoded to mean drugtrading. That such an operation gave them much-hidden control over the economies of the world, by holding these mystery assets in trading coups that gave them enormous leverage to help finance revolutionary technologies, such as “The Bell” and various extreme inventions such as flying saucer equipment.                                                                                                                      

“In other words, the technology was intimately tied to the financial community, and to the vast underground of the national drug cartels and criminal syndicates,” says Farrell, “…’rogue group,’ an international ‘breakaway group’ operating entirely on its own…a core of intelligence operatives, rogue military men, technocrats, and, of course, corrupt, or compromised, bankers.”  (Covert Wars, pp. 123-124)

Hidden Financial System

A short list of hidden and rogue funds run a gamut which included Operation Gold Lily, Japan’s M-Fund,  Foundation X, Operation Bernhard, the 57 Bond, Federal Reserve Bonds, the Bank of Credit and Commerce International (BCCI), Operation Morganthaus, as just a few of the havens, conduits and hidden overseers. Coincidentally, many of the “bonds” issued had a 1934 date, demonstrating their illegitimacy. Such counterfeiting was also used to “wreck” economies, as was done to the British war economy.

These large caches were often rehypothecated several times in huge financial schemes of fraud, leveraging even more credit, allowing this breakaway civilization to fund gigantic projects of covert operational nature. Such secret funding probably entailed clandestine space research and even the purchase and collateralization of planets.

Farrell's Redux Photos Redux ( httpswww.zerohedge.comnews2017-10-29how-elite-dominate-world--part-5-endgame-complete-and-utter-global-domination ) 20171029_nwo
Secret and Rehypothecated
https://www.zerohedge.com/news/2017-10-29/how-elite-dominate-world-%E2%80%93-part-5-endgame-complete-and-utter-global-domination

“…the breakaway civilization is in part ‘a banking fraud and counterfeiting scheme, with particle beams, lasers, grazers, anti-gravity, and covert operations.”  (Covert Wars, p. 157)

The National Security Council in 1948 established on its own authority the Office of Policy Coordinator, with covert operations under the direction of its chief, Frank Wiser. Edward Lansdale, a military assist, and intelligence officer embodied a “coalescence of interests,” resulting in Operation Golden Lily. Lansdale was transferred to the U.S. Air Force by General Hoyt Vandenberg, the U.S. Air Force Chief of Staff. After attending the Strategic Intelligence School of the U.S. Air Force in Colorado, he was transferred to Frank Wisner’s Office of Policy Coordination at the CIA, and then back to the Philippines to oversee the recovery of the Golden Lily loot.

It was Vandenberg who (serving twice as the U.S. Air Force Chief of Staff and as a CIA director) had held superior offices to General Nathan Twining. Twining was head of the Air Force Air Materials Command at Wright Patterson Air Force Base in Dayton, Ohio.  Vandenberg ordered Twining to New Mexico to participate in the Roswell UFO incident, as well as receiving reports from General Ramey at Roswell. Vandenberg was also an alleged member of the controversial secret study group, MJ12.

Lansdale was interfaced with the UFO phenomenon, ultimate technological projects, and notorious CIA-Nazi- International havens, including Eisenhower’s Secretary of State, John  Foster Dulles, and his CIA – Wall Street lawyer brother, Allen Dulles. This curious blend of a “UFO arm,” Big Money, and covert warfare, became known as The Enterprise. Enter, various front companies such as Centremondiale Commercial and the Permindex Corporation, one of the many fronts by which fascist financiers operated. Prior to the creation of the CIA, Allen Dulles created the World Corporation, which led to World Trade Centers throughout the world, such as the World Trade Martin New Orleans (associated with CIA agent Clay Shaw of the Jim Garrison-Kennedy assassination fame).

One of the biggest covert operations by The Enterprise, beyond bullion theft, gold price fixing, was the engineered economic collapse of the Soviet Union. The ability to accommodate such feats became known as full spectrum dominance.

Farrell's Redux Photos ( httplonkeropiirakka.blogspot.com201204leffamielipide-iron-sky.html ) Iron Sky konsepti ufo-ohjaamosta
They were Equipped for Full Spectrum Dominance
http://hdwall.us/high-definition-wallpaper/dscn0455-lets-have-alternate-history-retro-sci-fi-desktop-hd-wallpaper-960044/

“…control everything, everywhere, including the high seas, land, air, space and even cyberspace…from the galaxy to the mind…to win a war at any level of violence including nuclear war.”  (Covert Wars, p. 215)

Weather Warfare and Electromagnetics

Farrell expounds on the various indications that said various forms of electromagnetic weather warfare may exist, even giving further into Maser, Laser, X-ray and gramma-wave weapons, earthquakes, scalar or quantum potential weapons. He reviews how these sciences could have been discovered by the late Nikola Tesla in 1908.

According to former Busch Administration Assistant financier Catherine Austin Fitts, such technology in the hands of a “Breakaway Civilization…a group of people who have so much money and so much power…don’t feel under any compunction to obey…any other laws,” would not be afraid to use such invisible weaponry.  (p. 272)

An early start on such technology may have been discovered in the tales of the 1887 Airship Mystery, the Senora Aero Club, and the parent body from Germany: Nymza. The modern Nazi Bell is reminiscent of the Dellschan Airship’s NB gas.

“…what began in the nineteenth century as a secret ‘airship’ program,” says Ferrell, “quickly morphed in the postwar era into a secret space program…the development of technologies that could, to some extent, do double duty, but the vast system of finance to achieve it..”  (p. 310)

Interference and mechanical shutdowns at missile bases about the globe by UFOs seemed to indicate the advanced technology of the (modern progression of) Airship cabal with their directed energy weapons.  Farrell sees some UFOs as a further progression of Nazi ‘fusion’ experiments in Argentina (Dr. Ronald Richter) with lithium-7 fusion reactions, rotating plasmas and zero energy. UFO phenomenon, he says, are in part indications of “a parallel group owing ultimate allegiance to something supranational” in nature.  Ben Rich’s (Lockheed skunkworks scientist) chilling words that we now had the capacity “to take ET home” alluded that someone truly had broken away, and has access to world-altering or shattering, technologies as “Unfunded Opportunities.”

Parapsychological Weapons

Farrell further analyzes the use of esoteric, metaphysical, and occultist symbolism by a suspected breakaway and rogue nation. The attackers on 9/11 are, says Farrell, rife with “vast ritual magic and sacrifice on part of an international breakaway group.” He points to scientist Dr. Jacques Vallee who has said that some UFO sightings and some UFO abductions seemed to be “deliberately designed to be a psychotronic technology.”  (pp. 349-350)

(United Kingdom subject Gary McKinnon alleged that he tapped into secret databases of the U.S. military and discovered a vast, and very secret, space fleet program.)

A true breakaway civilization would probably “coordinate psychological operations on a truly celestial, cosmic scale…given the vast survey of a culture whose lust for power of all kinds is virtually boundless…manipulation systems of a planetary scale…as the technological capacity of emulation grows, so too does the scale of finance and secrecy.”  (pp. 357-358)

PART III        

The third book in this trilogy, Hidden Finance, Rouge Networks, and Secret Sorcery, holds most of the latest and potent ‘clues’ as to the aforementioned Breakaway Civilization. Farrell’s theme centers around the September 11, 2011 attack on the Twin Towers of New York and his compilation of information that, once again, indicates superior events behind this momentous series of happenings pointing at a rogue Power.

Synthetic Terror

Farrell quotes Webster Griffin Tarpley that 9/11 was, in part, “an orchestrated coup d’état, a false flag event of state-sponsored synthetic terror…shock the entire U.S. political system…and the public in general out of their inertia of normal life into a kind of war psychosis and paranoid obsession…”  (p. xvi)

Farrell continues to tie-in his continued comments that a breakaway civilization exploited secret funds, Axis loot, and vast war chests that funded various exotic technologies. He indicates that a Nazi and German International certainly played a part in the 9/11 fiasco, and he goes to great lengths to outline many details.

Links are found in the actions of suspects Mohammed Atta, al-Omaris, as well as Hani Hanjour, hijackers of flight 77. The erratic renting of automobiles, heavy editing of videos, questionable discovery of passports, the peculiar packing of luggage, suicide notes, and curious associations were all factors that opened questions about the hijackers.

Mohammed Atta’s association with Hoffman Aviation flight school melded with all kinds of hidden facts. Rudi Dekkers, the owner of Hoffman Aviation, had a rather criminal past, having been involved in a smuggling operation—including the smuggling of aircraft into the U.S. over the artic, despite radar tracking by American, British and Russian equipment. Atta had previous flight experience and even attended an international officers’ school at Maxwell Air Force Base. Hijackers Abdul al-Omari and Sajed al-Ghandi attended similar military flight training at Brooks Air Base in Texas and the Defense Language Institute in Monterrey, California.  (pp. 22-23)

Carl Duisberg Society

When in America, Atta’s behavior didn’t appear Wahabbi.  His friends attest that he had pilots’ licenses from six nations before Hoffman Aviation. He visited strip-joints, snorted cocaine, smoked marijuana, and has some sort of relationship to the Saudi Royal Family and elite. But, perhaps, the biggest suspicion was his seven years in Hamburg, Germany, and his association with the Carl Duisburg gesellschaft. Bill and Hillary Clinton, David Rockefeller, Henry Kessinger, and Atta Mohammed also worked at the CDS (Atta, as a ‘scholarship holder’ and ‘tutor’ from 1995-1997).

Carl Duisberg was a founder of the infamous I.G. Farben Nazi cartel and war machine. Atta studied German in Cairo, and investigator Jay Kolar speculated that Atta was being groomed as an operative and patsy. Farrell uncovered a doppelganger Mohammed Atta with the same name, involved in a terrorist bombing of a bus in 1986; later, it was discovered that possibly three Moham(m)ed Attas existed (similar to the suspiciously three Lee Harvey Oswalds in the Kennedy assassination).

Level Three

Further suspicious activity involved Venice, Florida police Sergeant Marty Tremor, who confiscated Huffman Aviation’s entire files, carted them into a C-130 cargo plane that headed for Washington.  Jeb Bush was aboard.    

Journalist attest to being told by American intelligence that they were aware months ahead of time about specific targets, dates, time and methods of financing of the 9/11 attacks: all of this had been blocked from public knowledge.  (p. 36)

Farrell speaks of a Level Three conspirator-cabal that manipulated and manufactured the popular hijacking story and the consequential pancake destruction theory of the Twin Towers.

“It was a clever means to divert the publics’ attention away from the incongruities’ and impossibilities of that model,” says Farrell, “and from examining the actual mechanisms of their collapse.” (p.42)

Somebody was leaking vital facts before the actual attacks. Egyptian President Hosni Mubarak was aware and told Washington. As a trained pilot, he also told Washington how impossible it would have been to perform a spiraling descent in which hijacker Hanjour was blamed.

There was Operation Northern Vigilance, as a simulation attack with false radar blips in the air traffic control system. These files had been purged. The Hidden Players also threaten that Air Force One was to be next in the attacks, and showed that they had knowledge of “Top Secret codes.” Apparently, the Pentagon’s five missile defense batteries had been shut down.

Witnesses saw no commercial airlines that approached the Pentagon, but a peculiar aircraft traveling about 500 mph that made a sharp turn, while another was described as a “cruise missile with wings.” Data recordings and Black Boxes simply disappeared. Air Traffic controllers said they saw the aircraft do a strange maneuver on their radar screens, but Flight 77 transponders had been turned off.  False radar blips, however, were part of the Amalgam Virgo drill. A mysterious Flight X at the Cleveland airport at that time, according to researcher Michael Rapaport, showed possible slightofhand tactics.       

The wreckage of Flight 93 was strewn over eight miles, indicating it had been shot down while in flight. There was no debris at the alleged Pentagon crash site. A second smaller white aircraft was witnessed near Flight 93.  One woman said it was a military aircraft.

Farrell outlines the numerous warnings the American national-security-military-intelligence received and apparently let the events unfold without warning the general public, “…the result of a deliberate political decision not to act.”

Hidden Truth of Other Players

The Bush Family, the Bin Ladens and their Carlyle Group, all had intimate links to the CIA. Ultimately, all three were used as patsies, says Farrell, when Level Three Controllers turned their 9/11 plans “inside out.” 

The intimate and intricate intertwining of plots and programs could be seen in the mysterious testimony of Delmart Vreeland who gave a sealed warning with many amazing details of the 9/11 attacks, well before the attacks occurred, possibly indicating Vreeland’s connection to American Naval intelligence. Vreeland indicated that trillions of dollars had been taken out of the United States Treasury, and Vreeland spoke of the Bush’s, the Clintons, and Federal Reserve Chairman Alan Greenspan.

As already mentioned, there appeared to be a Level Three use of ‘doubles.’ Hanjour al-Hazini and al-Mihdhar were in San Diego through the month of August up to September 8, 2001. This is contradicted by sightings on the opposite coast, crossing back to Las Vegas, returning to Baltimore, and spending days in Newark. Likewise, there appeared to be Ziad Jarrah #1 detained in Pakistan and Afghanistan, while Jarrah #2 was in flight school in Venice, Florida. (pp. 124-125)

Farrell says 46 drills existed closely aligned to the 9/11 events, and in the words of researcher Webster Griffin Tarpley, “Terror events were largely camouflaged, assisted, conducted and bootlegged through these drills.”   

Farrell includes the testimony of Dr.Tatyana Koryagana, a Russian economist and rumored member of Russian President Putin’s inner circle, about the existence of a global rouge network…”above and beyond that of al-Qaeda…had access to a financial war chest of approximately $300 trillion”—in which Mohammed Atta appeared to be a member through Carl Duisburg gesellschaft, the notorious I.G. Farben cartel and a postwar Fascist Breakaway Empire.

9/11 Financial Crimes

More than $100 million in illegal transactions appeared to have rushed through the WTC computers before and during the 9/11 disaster, one bank was Deutsche Bank.  Mohammed Atta and many of the 9/11 hijackers had kept accounts with Deutsche Bank. The bin Laden family, as well as the Bush’s and virtually every financial scandal of the postwar world, did probably have some intelligence and underworld criminal masters.” (p. 160)  (Morgan Guaranty Trust, Chase Manhattan, Citibank, Jardine Matheson, UBS, HSBC—and Deutsche Bank.)

This Enterprise, these Leaders, says Farrell, were a polycentric network within and behind corporations and agencies of the Federal government, housing code names, code words, and part of a hidden slush fund’ in the billions to trillions of dollars which would be used to fund highly secret black technologies.

Farrell's Redux Photos ( httpswww.pastemagazine.comarticles201710exclusive-wolfenstein-ii-the-new-colossus-environm.html ) ROW_Wolfenstein II_Area_52_hangar_interior
Secret Black Technologies
https://www.pastemagazine.com/articles/2017/10/exclusive-wolfenstein-ii-the-new-colossus-environm.html

(Researcher Laurent Guye’not points out that Bryan C. Jack, a Pentagon worker responsible for various aspects of accounting for the American defense budget, was on board flight 93.)

The hidden system of finance involved and passed through many significant hands and many powerful banks on a global basis, at the end of the day, this society could hide all trades. All traces, with the use of PROMIS software, everything would become off the record and invisible.

Bringing Down the Towers

The obvious murder weapons used on 9/11 are fairly disputed, says Farrell, and while each ‘theory’ may have contributed to the towers’ demise, the ultimate weapon would appear to be some form of directed energy with electromagnetic beams. Farrell gets into how and when the Planners carried this out.

september-11-terrorist-attack-world-trade-center-photog-steve-ludlum.jpg
Farrell's Redux Photos ( httpswww.vaken.sechatta-med-jan-guillou-idag-1530-0905 ) 911-explosion
Directed Energy
https://reactionarytimes.com/2017/06/04/this-is-for-allah-is-terror-the-new-normal/
https://www.vaken.sechatta-med-jan-guillou-idag-1530-0905

Normal explosions and Nano-thermite may have been used by some “planners,” though most devices could not have raised enough temperature to melt massive steel structures. The “ejecta” and plumes indicate something extraordinary was vitalized; as well as the disappearance of approximately 1100 victim bodies. A high percentage of nuclear fusion/fission material, barium, strontium, thorium, uranium, lithium, lanthanum, yttrium, chromium and tritium—and subsequent cancers to victims—indicate sophisticated explosives.  (pp. 195-196)   

It appears, says Farrell, that the Nazis may have experimented with such exotic science in March 1945 at Ohrdruf, Germany with plutonium 239 of extremely high purity, as well as deuterium and tritium to boost yield: chemical laser isotope enrichment technology. Dr. Judy Wood concurred in her book Where Did the Towers Go?   Farrell talks about Masers, interferometry, and approximately 90,000 tons of concrete converted to a homogeneous mixture consisting of sub-100-micron particles of pyroclastic clouds. The clouds appeared to be five times the volume of the amount of the original building. Ferrell says: “Indeed, intergranular melting seems to describe a process where the molecules of steel themselves were exploding internally.” 

Farrell's Redux Photos ( httpswww.disclose.tveuropean-scientific-study-concludes-all-three-wtc-towers-collapsed-due-to-a-controlled-demolition-312113 ) european-scientific-journal-911-wa
Pryoclastic Clouds 
http://www.thetruthseeker.co.uk/?cat=46

The details of the “Planners’” constructed devices are probably questionable, but Farrell believes he is pointing in the correct direction: use of sophisticated phase conjugation in the microwave range of the spectrum with conjugate mirrors of great ability to break down material and recombine it again. Farrell points at unknown space-based components.

Versions of PROMIS software had spread around the globe to numerous defense contractors or networks, financial Criminal Enforcement Network (FinCEN), and the U.S. Treasury.

Mega Rituals      

“The ultimate alchemical wedding of high technology and deep black magic?” asks Ferrell.  “What if it was used to coordinate and plan the details of a Mega Ritual?”

Farrell sees a gigantic working of ritual magic behind the 9/11 scenes: the Twin Towers as the twin Masonic pillars of Jachin and Boaz, quoting researcher Peter Levenda, and the events as a massive magical ritual of human sacrifice and technology in the form of exotic means of destruction of the Twin Towers.   

Peter Lavenda is quoted about C.G. Jung’s meaningful coincidences as if some “subconscious Group…Mind of the Masses” was at work. Farrell quotes author S.K. Bain who listed a broad range of psychological warfare, occult symbols, esoteric elements, Egyptian gods, Pillar of Hercules, the Veil of Isis, and many structural symbols and constructs and signatures: The Sixteenth Greater Trump of the Tarot Tower, the twin towers of Deutsche Bank in Frankfort, plus several others: all indicate a deeper blackest of the Black Magic.

(President G. W. Bush’s reading of the story at Booker Elementary School, “My Pet Goat,” symbolized Baphomet, the sacred androgyny god Pam.)

Russian economist Dr. Tatyana Koryagina spoke of this Network having access to over $300 trillion, placing it outside of any merely American lower level intelligence.

Jingoistic Plastic Patriotism

Farrell says that America, since 9/11, has taken on an increasingly brutal fascist culture, a kind of jingoistic plastic patriotism. He speaks of a global network of “finance of terrorism…technological sophisticated cyber warfare to exotic weapons of destruction…resulting in the sacrifice of innocent lives for ultimate evil.”

“Money, power, occult knowledge, exotic technology, and financing in the trillions of dollars,” says Farrell, “do signify…a much deeper player, a player with an unrecognizable center of power, a player everywhere and nowhere…”  (p. 262)

Photos Extra Nazi Wing ( httpwww.darkroastedblend.com200904wonder-weapons-of-world-war-two.html ) truketyjtrhdgbf
An Unrecognized Center of Power
http://www.darkroastedblend.com/2009/04/wonder-weapons-of-world-war-two.html
*******

Farrell owes much credit to numerous researchers that are cited throughout his books: Webster Griffin Tarpley, Thierry Meyssan, Jay Kolar, Daniel Hopsicker, Nafeez Mossaddeg, David Ray Griffin Michael Ruppert, E.P. Heidner, Mark H. Gaffney, Eric Hufschmid, Laurent Guyenit, Jim Hoffman and Bonnie Faulkner, Rodney Stich, Peter Lavenda, S.K. Bain, Peter Dale Scott, Gladio Cottrell, John O’Neill, Catherine Austin Fitts,  Michael Busby, Dennis Crenshaw, Richard M. Dolan, Ross Bellant, Martin A. Lee, Jim Marrs, Henry Stevens, Rich C. Hoagland, Anthony Sutton, Dr. Judy Wood, and several other dedicated authors.

Erdmann is prohibited from giving more detailed facts from Farrell’s books, which the public will relish in their own reading, hopefully inducing them to expand and increase their study.

*******
You can reach Steve Erdmann – at dissenterdisinter@yahoo.com or independenterdmann@gmail.com.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can friend him at:
Facebook – https://www.facebook.com/stephen.erdmann1 –
Or – visit the Dissenter/Disinter Group –https://www.facebook.com/#!/groups/171577496293504/.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can also visit his articles at the following:
http://www.minds.com,
http://www.ufospotlightwordpress.com,
http://www.ufodigestblog.wordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/,
https://www.facebook.com/TheUniversalDigest/?__tn__=%2Cd%2CP-R&eid=ARB3i9eJwirzOvkPMA5RwMhIUX-3xSP69ME1YHZhQjeSqnxoiNgzhKt1WVX8EUlupUgLBVzd_mX-VXAN
*******
Photos Extra Steve1 34934490_10156520897824595_8244253719684710400_n
Steve Erdmann – Independent Investigative Journalist

Another version of this article can be seen at Joseph Farrell’s Nazi Trilogy Redux – https://wordpresscom507.wordpress.com/2020/06/07/

The Dracula Project

Photos Extra Running Man ( httpwww.alamy.comstock-photoflying-saucers.html ) 1960s-uk-flying-saucers-magazine-cover-detail-EXT1JC

TheDraculaClan ( httpmysteriousuniverse.org201705cattle-mutilations-the-government-files ) Bodies field

TheDraculaClan ( httpmanapop.comfilmthings-to-come-1936-review ) Plane nice-helmet

Photos Extra Future ( httpstarwars.wikia.comwikiTemple_SpireLegends ) Ruinsoftowers

Photos Extra Nazi Wing ( httpwww.darkroastedblend.com200904wonder-weapons-of-world-war-two.html ) truketyjtrhdgbf

The Dracula Clan

By:

Steve Erdmann

Copyright, C, Steve Erdmann, 2018

Another version of this article can be seen at The Clan of Death – – https://wordpresscom507.wordpress.com/2020/06/07/

Sky Fall  – by Adele
https://www.youtube.com/watch?v=DeumyOzKqgI&feature=share
https://www.youtube.com/watch?v=q-gLRp5bSpw
 https://www.youtube.com/watch?v=_4gdhsVKTcs

Skyfall
Adele
This is the end
Hold your breath and count to ten
Feel the earth move and then
Hear my heart burst again
For this is the end
I’ve drowned and dreamt this moment
So overdue I owe them
Swept away, I’m stolen
***
Let the sky fall
When it crumbles
We will stand tall
Face it all together
Let the sky fall
When it crumbles
We will stand tall
Face it all together
At skyfall
At skyfall
***
Skyfall is where we start
A thousand miles and poles apart
Where worlds collide and days are dark
You may have my number, you can take my name
But you’ll never have my heart
Let the sky fall
When it crumbles
We will stand tall
Face it all together
***
Let the sky fall
When it crumbles
We will stand tall
Face it all together
At skyfall
***
Where you go I go
What you see I see
I know…

“Skyfall” is the theme song of the 2012 James Bond film of the same name, performed by the English singer Adele. It was written by Adele and the producer Paul Epworth, and features orchestration by J. A. C. Redford. The film company Eon Productions invited the singer to work on the theme song in early 2011, a task that Adele accepted after reading the film’s script. While composing the song, Adele and Epworth aimed to capture the mood and style of the other Bond themes, including dark and moody lyrics descriptive of the film’s plot.  (https://en.wikipedia.org/wiki/Skyfall_%5BAdele_song%5D)

Photos Extra Skyfall ( httpwww.imdb.comtitlett1074638mediaviewerrm820004864 ) MV5BYzIwN WEzNzEtZTRmNS00ZjNiLWJjOWMtMzVlOTVlYjVjZWRiXkEyXkFqcGdeQXVyNjUwNzk3NDc@._V1_
Adventofdeception.com,“The Illuminati Evil Earthly Organization,” “Humans thrive on power, domination and secretiveness…The evil Illuminati structure top councils of the ‘Grand Drude Council’ and the ‘Olympians,’ the mind controlling professionals.”
https://www.creativelighting.co/blog/2015/6/29/skyfall-cinematography

The time: during the 1970s. The Place: the UFO Study Group of Greater St. Louis.  The event: the Study Group had opened an Animal Mutilations Committee to study the bizarre rash of animal mutilations across the globe, often accompanied by strange aerial objects in their happening. I was the Director. Here are some kaleidoscopic stories from that period. Many of these reports are produced here for the first time..

PART I

The Saga Had Begun

“To achieve such a feat would require molecular-specific surgical devices capable of going through skin, cartilage, muscle, bone an organs to remove tissue from a specific organ without causing any cutting damage to the rest of the body — an impossibility on Earth, although a hypothesized innovation in the distant future. In all, there are over 10,000 documented instances of animals being bewilderingly mutilated in the US alone since 1955 — and in every case that has been investigated by law enforcement, no human or predator has ever been found to be the culprit.”

https://sputniknews.com/us/201708011056085483-animal-mutilation-aliens-abduction/

MYSTERIOUS SURGEONS

Outrageous phantom killers have gripped the imagination of men for centuries; be they fictionalized accounts such as Bran Striker’s 1897 humanoid-bat DRACULA (vampires allegedly would eat dead bodies [necrophagism] and mutilate corpses to induce sexual excitement [necrosadism]), or the actual 1888 phantom ”lady butcher” of London, Jack the Ripper.  But even brasher than more popular episodes of California’s Zodiac Killer or the Charles Manson massacre, there has been raging animal mutilations that would put these historical perversions to shame.

From one end of America to the other, including foreign countries of Sweden, Puerto Rico, Africa, and Canada, cattle, dogs, sheep, chickens and other types of animals have been found with their sexual organs skillfully removed, limbs taken by mysterious surgeons, udders, eyeballs, ears, and heads butchered. In many cases, the blood had been drained leaving little or none in the bodies.  In one case, no incision could be found in a dog whose heart was missing.

In Puerto Rico, long teeth-like incisions had been in bloodless bodies of chickens, sheep, dogs, and cattle. Hearts were taken from cattle in Sweden.

TYPICAL MUTILATIONS EVERYWHERE

Unusual animal deaths had been noted in the past. Snippy, a pet horse belonging to Mr. and Mrs. Berle Lewis, was found near Alamosa, Colorado on September 7, 1967. Every shred of flesh was missing from the animal’s neck and skull. A perfectly smooth, precisely cut area was above the neck bone, which also was protruding from the center. No blood was found. A three-foot-tall Chico bush had been crushed within three inches of the ground. For a 10-foot radius around the bush, the sandy ground appeared to have been smoothed out. A Geiger counter indicated radioactivity around the dead animals.  Later, Mrs. Lewis ’s boots were found to have been contaminated from radioactivity and palm of her had begun to turn red and a burning sensation after touching Snippy. Fifteen tapering, circular “marks” were found in the area and more flattened brush.  Six indentations were found two-inches across, four-inches deep, and formed a circle in diameter.

TheDraculaClan ( httpswww.huffingtonpost.com20130904cattle-mutilation-theories-unexplained-files_n_3866620.html ) o-COW-facebook
https://www.huffingtonpost.com/2013/09/04/cattle-mutilation-theories-unexplained-files_n_3866620.html

Similarly, in 1975, Dr. Rodney Walker, zoo veterinarian of the Cheyenne Mountain zoo, discovered a mutilated bison. The bison’s udder, right ear, and sex organs had been removed with surgical skill.

A calf was found five miles south of Glenwood, Colo., and the tongue and rectum had been surgically removed. There were absolutely no tracks. The calf was 600 yards from the corral containing the mother. There was no way the animal would have walked through the new alfalfa without leaving a track, except where the animal went down.

Francis Cook of Yoder lost two spring bull calves of about 400-pounds. Their blood had been drained and their sex organs are taken with no sign of blood in the vicinity. The tail also was cut from one of them.

A 1200-1300-pound Hereford cow was found southeast of Sterling with the tongue cut out, lower jaw peeled away, and the rectal area of the animal mutilated. Another 600-pound animal was killed and two patches of skin were cut away. The rectal area has been mutilated. A patch of hide and skin were found which showed definite cut marks of some sort as if cut at an angle. A pregnant heifer found three miles west of Kiowa, Texas had similar cuts. Its rectal area and udder had been cut out in a “really professional job.” It is suspected that the heifer may have been taken away and mutilated and then the carcass was brought back.

Sheriff Harry L. Graves of Logan County, Colo., was particularly perplexed by a cow whose teeth had been taken by surgical precision. “We’ve had two previous mutilations where one or two teeth have been pulled but we found them in the animal’s mouth, Graves said. “On this one, all the teeth had been cut out with a sharp instrument and we couldn’t find them anywhere.”

Sheriff Graves reported a number of unusual attacks. One mutilated calf was found with radar chaff stuffed inside its mouth. Some chaff was found on the ground along with a small, silver-colored chaff box coded RR112/AL on the top of the box. Major Keck of the Air Force later replied that the number was no code used by the Air Force.

Equally mysterious, Graves reported that a number of autopsied mutilated calves had also succumbed to rare diseases such as peritonitis. In several cows, bacteria of the Clostridium genus were found.  In a few cases, clostridia infection was reported to be the cause of death.

Two cows found in Park County “couldn’t possibly have been where they were found unless they had been dropped from aircraft,” according to Sheriff Norman Howey. The two cows were half of a mile apart in different pastures than the one their owner left them in. “There were no strange tracks or footprints,” Sheriff Howey said. “On top of that, the gate was padlocked.” One cow’s bladder had been “popped” out of its body as if the rectum had been excised from the pressure of the fall.

Sheriff George Yarnell of Elbert County spoke of a typical case where a cow was found with the udder neatly cleaned out leaving only the skin which was tightly packed with several gallons of sand. The teats had been neatly snipped off and arranged in order on the leg.

Forty sheep were found near Leadville, Colorado “riddled with holes.” A sheep rancher said one of his herders told him that an “Army-colored” helicopter flew over one of his herds and sprayed the animals with bullets.

TEXAS

Texas likewise had its share of the bizarre as a few typical cases had revealed. The carcass of an expertly skinned dog was strung by its hind legs to a barbed wire fence, the blood had been drained and its genitals removed.“It was an excellent job of skinning,” he said. “No flesh was torn. There was no remaining hide.  Even the ears had gone off the carcass with the hide.  Even the ears had gone off the carcass with the hide. The tail section also was stripped of any hide.  It’s just a very peculiar situation.” There was no sign of footprints or disturbances.

A calf found north of Sulphur Springs had been split open on the underside from about six inches back of the udder right through the udder, with two teats on one side and two on the other, clean to the brisket between the front legs.

‘The calf had been removed and the womb took out,” rancher Pete Long said. “Half the womb was removed and half pitched over the calf. Then I walked around and noticed the head was cut off and I haven’t seen any trace of it since then.”

A cow found on the Ray Goad farm had the udder and all the surrounding skin gone, removed by a very sharp instrument. The tongue had been also removed and was cut far back in the mouth. All blood vessels and veins were devoid of blood. Only a teaspoon full of clotted blood was found on one side of the heart and a few clots on the underside of the animal.

A large cow was found near Tyler with its seven-month-old fetus removed, and its vulvas and tongue also took. No blood was found around the carcass. Another cow found near Graham had a hole torn in the carcass and the sexual organs pulled out and cut off. Part of the organs was taken from the scene, but the others were left aligned in a neat row by the animal’s stomach. Similarly, a cow found on the Albert Johnson farm had its muzzle cut out along with the tongue in heart-shaped cut and removed in one piece. Four teats were cut off next to an undeveloped udder of the heifer and a perfect circle had been carved under the tail to remove the vagina and rectum together.

The carcasses of two heifers and a horse had been found in the Spring-Cypress Road area. A male calf was found on a ranch five miles northwest of Katy, and Montgomery County officials reported two mutilated cattle. A pig’s head was found on the edge of the Conroe city limits near Stewart Creek. A mutilated heifer was found lying in the center of a perfect-circle near whitespace. The sex organs were gone, and a ‘perfect-circle’ was found by the navel. A similar circle was found in a dead animal a quarter-mile away.  Both ‘circles’ were slightly radioactive.

.

OKLAHOMA

.

Oklahoma had its share of butchering by what could be called the Dracula Clan. A 700-pound cow found the Charles Collins place had its udder removed by a sharp instrument. Muggs Fox, a highway patrolman, said: “It appeared to be pretty smooth cut.”  

A whiteface cow on the Le Roy Schimmel farm had all its sex organs, udder, eyes, and tongue removed. Radiation was detected at the site. A calf examined by a Hugo veterinarian who said: “the work was done on the animal with a knife or a very sharp instrument.” The calf’s left eye had been cut out, both ears cut off, the tongue slashed, the rectum cut and other slashes inflicted. An opening the size of a football had been cut in the three-week-old calf’s navel. Herman Hatch’s calf had its tail severed and its intestines lay near the animal. The calf had a one-foot gash from the rectum downward and its right leg was broken.

.

NEW MEXICO

.

New Mexico had a similar case where radiation was detected. Manual Gomez discovered one of his cows mutilated near Dulce, New Mexico: Its udder and anus had been removed “with a sharp instrument.” Similar to the ‘Snippy” case, tripod-like tracks were discovered nearby and a radiation check found an abnormal amount of radiation in some of those tracks. A yellow substance was also found near the tripod-tracks.  Nearby shrubs appeared to be scorched and dying.  Wild predators refused to approach the cow. A calf that the cow had been nursing was missing.  

.

WYOMING

.

Another typical case was a mutilated cow found on the Raymond Jones farm near Newcastle, Wyoming. The udder had been removed except for one nipple, and the lower lip of the animal had two definite cut marks made by a sharp instrument. The middle of the lips had been taken; the tongue was completely removed. Interestingly, off to the side of the animal was a circle two feet in diameter and the grass at the spot was a bright yellow. “It was almost a perfect circle,” Sheriff Willis Larson said. 

.

WASHINGTON

.

Cases have been reported in the state of Washington. A mutilated cow was found on the Don Larsen farm in Machias, Washington. The left eye was missing. There was a circular five-inch incision made in the anal area. The rectum and colon had been excised. There was no sign of struggle, though burn marks could be seen. The incisions appeared to have been neatly made.

.

MISSOURI

.

A veterinarian near Salem examined a mutilated goat whose blood had been drained and was possibly anesthetized with a needle into one of the arteries. The udder was removed by a single stroke of a very sharp instrument. There were no lacerations in the cut skin—and no blood was on the ground in the area. The butcher showed a high degree of animal anatomy.

.

MONTANA

.

Two mutilated cows were found on a ranch near Belt, Montana. One cow had its bag, teats rectal area and reproductive organs removed, making it possible to look completely through the bag area and out the rectal opening. The hide had been cut with a very sharp instrument and displayed serrations similar to those created with pinking shears.  A mutilated cow near Utica had its testicles and the cords removed.  However, several stones, weighing as much as six or seven pounds each, had been removed from a rock pile and turned over and moved about. A filmy white substance eventually covered the cow. It looked like a cobweb; it was analyzed and found to be petroleum distillate.  In another case, a bull calf was found to have a hole drilled in the back of its head and the brains removed.     

A mutilated cow found near Stockett also had a white filmy substance on the cow’s neck. Extensive tests failed to identify the substance. A mutilated Shetland pony found in Teton County had all its organs removed and two puncture wounds were discovered in the horse’s bruised throat. There was no blood in the body except for two small vials that were recovered. A mutilated cow near Belt was found in a plowed field but no dirt was disturbed and none of the furrows smashed down. Two teats were cut off and the rectal area removed. An incision found under the right leg by a veterinarian who said the opening led all the way to the heart.

.

MINNESOTA

.

In Minnesota, a number of cases appeared. A horse belonging to Luane Johnson had numerous knife wounds; one ear removed as well as the sex organs. A 400-pound heifer belonging to Frank Schiefelbein near Kimball was found with the eyes, left ear, tongue, and part of the lip taken, and the animal was lying in a perfect circle of bare ground in a snow-covered field in which no footprints could be found anywhere in the area. There was only a meager 20 c.c.s of blood left in the carcass. In another part of Meeker County, a mutilated pig was found inside a barn that had the usual cuts. The owner said his yard-light had gone out for about 20-minutes and then came back on.

.

TheDraculaClan ( httpmysteriousuniverse.org201705cattle-mutilations-the-government-files ) Bodies field
http://mysteriousuniverse.org/2017/05/cattle-mutilations-the-government-files/
.
UTAH

.

Sheriff Keith Hansen of Carbon County, Utah investigated a case in which the jaw, tongue, heart, and lung were taken from a cow and the blood drained. A University of Utah medical examiner said the incisions looked as if they were made by a laser beam.

Frequent reports of helicopters and low-flying planes in mutilation vicinity suggested a possible connection. But in many cases, though the aircraft appeared to be conventional, a close inspection revealed very unconventional behavior.

.

PART II

WINGS OVER THE WORLD
Helicopters and things
It’s Christmas 1940, and Everytown resident John Cabal (Raymond Massey) fears that war is imminent. When it breaks out, the war lasts 30 years, destroying the city and ushering in a new dark age of plagues and petty despots. But there is hope in the form of Wings over the World, a group of pacifist scientists and thinkers led by Cabal. Their dream is to build a Utopian society on the ruins of the old. But first, they’ll have to unseat the latest ruling tyrant (Ralph Richardson). Things to Come  (Motion picture, April 17, 1936). 
https://nerdist.com/schlock-awe-h-g-wells-highly-inaccurate-things-to-come/.

.

TheDraculaClan ( httpmanapop.comfilmthings-to-come-1936-review ) Plane nice-helmet
John Cabal – Pax Mundi – THINGS TO COME –  “They have to come to earth some time.”
http://manapop.com/film/things-to-come-1936-review/

.

H.G. Wells, THINGS TO COME, September 1933:
Boss: “I am the law here.  Where do you come from?  What are you?”  John Cabal: “Pax Mundi.  Wings over the World.”
Boss: “They have to come to earth sometime. What is this World Communications?  A handful of men like ourselves. They are not magic.”

.

TheDraculaClan ( httpwww.roger-russell.comthingscomethingscome.htm bomber3
Pax Mundi – Wings over the World
http://www.roger-russell.com/thingscome/thingscome.htm

.

Photos Extra Nazi Wing ( httpwww.darkroastedblend.com200904wonder-weapons-of-world-war-two.html ) truketyjtrhdgbf
http://www.darkroastedblend.com/2009/04/wonder-weapons-of-world-war-two.html

.

The Carol Werkmeister family discovered a mutilated cow on their farm on November 12, 1974. The cow had typical cuts. It was during a conversation with sheriff deputy Bernard Staib that unmarked helicopters in the area were mentioned. Mrs. Werkmeister said they had been visited by one strange copter on November 13 about 8:35 p.m. as it moved very slowly over their farm. They later discovered other neighbors had been buzzed by the copter; the navigational lights didn’t seem in the accepted positions.  Sheriff Staib previously tried to track these helicopters through airports and air bases but with no luck.

During April 1975, a mutilated Angus cow was found on the Chester Gourley farm in Carrollton, Illinois. The left ear had been removed. The left rear and left front teats were amputated. The left rear and left front teats were amputated. The anterior tip of the tongue had also been cut off. The left eyeball was punctured.

Gourley mentioned a strange motor sound the night before and also mentioned that relatives in nearby Brighton had reported mysterious helicopters the week before.

.

TheDraculaClan Black2 ( httpswww.youtube.comwatchv=tbX5rOngEeY ) maxresdefault
https://www.youtube.com/watch?v=tbX5rOngEeY

.

Phillis Beutell and her son Randy witnessed an unmarked utility helicopter that came out of a field of Angus cattle. Several weeks before the mutilation, the copter buzzed the whole area and was witnessed by neighbors Alf Wilson, Clifford Beilsmith and Ralph Macaffe. Macaffe said the occupants of the copter wore heavy sunglasses and were smiling mischievously when they swooped down and buzzed the cows. When Randy counted heads a day later, one cow was missing. The Wilsons also remarked that a large unmarked white cargo-type helicopter was seen earlier to have taken off from the Beuttel property and then disappeared.

James Stevenson of Meadowlark farm near Percy, Illinois, reported daytime sightings of unmarked helicopters buzzing his property. Sheriff Louis Layton said the southern Illinois area had numerous reports of “green helicopters with no markings” three days prior to the discovery of missing cattle in the area. Copters were seen going northwest and also near Red Bud, Illinois.

Likewise, Margaret Stone reported a helicopter sound that scared her cattle at Jonesboro, Illinois. It lasted for 30-minutes. She also heard the noise of a truck starting and changing gears about six times, as if hauling a heavy load.

A rancher who lives about 16-miles northeast of Kiowa, Colorado, saw a red-white helicopter land about a quarter-mile from his house on a high knoll, but it took off before the farmer could get to it. A heifer belonging to Jim Russell had been mutilated and the blood drained. They had looked for the cow days before, but suddenly it was found.  “I’d been by that spot several times,’ said Mrs. Russell, “and you’d think I would have seen her.” The animal’s neck was twisted and a hind leg was broken “as if she had been dropped.” Coyotes wouldn’t touch the animal.

The Cascade County, Montana Sheriff’s Department had received reports of several such copters. The wife of a former deputy reported that she heard a machine noise approaching one night; it became very loud as if it were located in their backyard. Two beams of light came into the room where she was babysitting and lit up the entire room: one red beam and one white. Then the noise dropped to a lower patch and the lights went out. The family dog didn’t bother to bark. A neighbor reported that next day that he had also seen the series of red lights that flashed near the ground and then go out. Three days later a lady near Belt reported that a helicopter flew over her house at tree-top-level and circled her sheep. The craft was navy blue with yellow lettering.

.

TheDraculaClan ( httpwww.topteny.comtop-10-most-mysterious-events-in-history ) Black-Helicopters
Mystery Helicopters
http://www.topteny.com/top-10-most-mysterious-events-in-history/

.

Deputy Arne Sad of Fort Shaw heard a helicopter sound in September of 1975 as he drove west of Great Falls.  He stopped the car to look but was unable to see anything.  The sound passed directly over him, but he could see no copter.

A ranch couple later reported a copter near Chouteau which turned off its lights and flew away. Ten days later several helicopters with spotlights were reported flying over missile sites near Lewistown. No official agency reported copters out in that area. Undersheriff Jim Shelton of Judith Basin County also reported two mutilated cows in his area and he also reported that unidentified helicopters had been seen about the same time. One cow had apparently been killed between 3:30 and 4 p.m. A green chopper had also been seen circling the area between 4:30 and 5 p.m. Two choppers were reported running together at night–and yellow, green and silver choppers with no numbers had also been reported.

A man camping in Moose Creek Canyon southeast of Great Falls said a helicopter came through the canyon so low that it vibrated his mobile trailer, but he couldn’t see it.  Similarly, a man in Teton County said that he and his two sons watched a helicopter hover over his cattle one evening but there was no noise. The craft had red and blue lights.

.

PHANTOM AIRCRAFT

.

Phantom aircraft with flight maneuvers similar to helicopters were observed within the vicinity of Minuteman missile sites. Chouteau and Teton Counties had similar reports.  But none of the objects appeared on Air Force radar screens. Malmstrom Air Force Base did scramble jet fighters in an unsuccessful attempt to identify the objects. The copters were flying in very windy conditions.

“Dan” witnessed a large helicopter about to land. On its side was a large silver star; the copter had many windows. “It was like a flying boxcar,” said “Dan,” and he and his father witnessed the copter rise and disappear.

Mr. and Mrs. Cromwell of Tujunga., California witnessed a helicopter that rose over a nearby canyon. Several people watched the copter that rose to about 1,200 feet, and the saw a bright object above the copter: an object of vari-colored lights with a top of vibrant blue-green, a middle of white and the bottom, a glowing red. The copter changed shape from round to diamond to chevron and then into a classic saucer shape. The copter sped off–then two copters returned about 11:00 p.m. flying in tandem. The object disappeared in the west and so did the choppers.

.

TheDraculaClan Black3 ( httpswww.flickr.comphotospingnews423041705 ) 423041705_d13624d110_b
https://www.youtube.com/watch?v=PSgLnfcFjD4

.

Usually, where animals are mutilated, a host of Fortean or “odd” phenomena occur: flying saucers, UFOs, hairy monsters, mystery aircraft, strange cat, and even strange people and creatures are seen. 

.

UFOs, MYSTERY AIRCRAFT, ODD PHENOMENA

.

When an oval-shaped object was seen hovering over a field in Enfield, Connecticut at 9:30 a.m. on March 4, 1975, a helicopter was also reported flying close to the object which emitted blue, green, and red light. No one could identify the copter.

When Ray Hawks sighted a UFO at Boulder, Colorado, reportedly in trouble as it wobbled in the air, a helicopter made an appearance. The object appeared to be two concave discs of dull aluminum that rectified its problem and disappeared into the clouds. Later, a supposed Air Force helicopter came to the spot, and a military colonel and a major were alleged to have told Hawks to tell the newspapers that the UFO would return. Hawks said that he would appear to be crazy if he said such a thing, but the military men insisted he should tell of the incident “to prevent public panic.”

When a UFO “flap” occurred in the Point Pleasant area of West Virginia in 1966, a large ape-like “bird,” labeled the Mothman, occurred along with reports of flying bats and strange persons. Lonnie McDaniel reported stories of animal deaths:

“In all cases, some internal organs had been removed—but never was there an incision or scar of injury.

“A dog was handed into the police station.  It had been found dead but with no injuries.  When it was examined, its heart was found to be missing—but there was no incision, no sign of surgery.  Its heart was just gone.”

.

TheDraculaClan Mothman ( httpwww.chasingthefrog.comreelfacesmothmanprophecies.php ctrmv
Artist Depiction of the Mothman
http://www.chasingthefrog.com/reelfaces/mothmanprophecies.php

.

UFOs often take an interest in animals. John Beer of Larnel, Kansas reported a large white light about 9:00 p.m. on February 1972 which hovered over the cattle corral on his farm. The object eventually disappeared. The next day the two bottom wires on the corral were found to be busted, and the milk cows had burned spots or ‘circles’ on them. Similarly, Kevin, Bevin and Curtis Ercanbrach reported a UFO inspecting a dead cow from the air in the Uintah Basin area of Nevada.

When an extremely bright UFO was reported in Wanaque, New Jersey on October 11, 1966, upon its disappearance another variety of UFO appeared:

“There were aircraft all over the place after this thing disappeared. But nobody know where they came from,” said Police Sargent Ben Thompson.“There were seven helicopters and, I would say, ten or twelve jets.

“They were very fast aircraft—and they kept circling the whole area. Stewart Air Force Base, which is the closest to the area, claims that they didn’t send anybody down here.  No planes or anybody.  Nothing.”

A high radiation reading was later discovered in the area. A “government investigator” made an appearance at the local high school and instructed witnesses that they saw no jets and helicopters. There wasn’t any official record of such a man, and the source of the aircraft could not be discovered.

When mutilated cattle were discovered in Fremont, Blaine, Nez Perce, Bonneville, Adams and other counties in Idaho, people began to speculate that helicopters reported being the blame. Sheriff Terry Thompson and Deputy Craig Rinehart doubted copters were used because the noise could be heard for five miles, and their office had no helicopter reports. However, Thompson did report that three or four UFOs had been seen in the Junipers north of the Elgin Snake River bottoms and west of Chester. Other farmers reported low-flying, high –winged planes over the Wilford area. The farmers reported that only low-winged planes are used for crop dusting. 

A mysterious black helicopter plagued a trailer court in the Elizabethtown of Pennsylvania during March of 1976. The Christina Lee family said a small, marked black helicopter buzzed the Nelson Trailer Court. A “low sound” helicopter was reported flying about the Charlie Firnekas farm near Midwest, Wyoming. Firnekas reported UFOs on several dates. Range detective Jim Zimmerschied said that cattle had been mutilated in the area. Zimmerschied said that a “mystery truck” with varied-lights moved through the woods. When mutilated cattle were found in the Cedar County area of Nebraska, mystery choppers were there also. “There have been nighttime sightings of helicopters, two of them verified,” said Sheriff Herbert Thompson.“We’ve had reports of night-landings too, although those have not been confirmed.”

.

TheDraculaClan Black1 ( httpwww.phillyvoice.cominvestigation-whats-creepy-unmarked-helicopters-menacing-philly-neighborhood ) Wr2Dl9SS.2e16d0ba.fill-1200x630-c0
http://www.phillyvoice.com/investigation-whats-creepy-unmarked-helicopters-menacing-philly-neighborhood/

.

Mutilated cattle were found within two to three days after the two confirmed helicopter sightings—one within half a mile of an area where the aircraft had been seen.

Two low-flying aircraft buzzed Robert Smith of the rural crescent, Iowa while he drove his tractor on his farm. One was a black twin-engine plane, and the other a white helicopter. Neither craft had serial numbers.

“They were close enough that I could see a guy get out of the helicopter and brace himself on a railing,” Smith said. “He was firing a handgun. I could see dirt fly from the bullets hitting the ground, so I put the tractor out of gear and dove to the ground.”

Airports had no data on the aircraft, though Smith said they both made numerous passes over his cornfield all spring.

Mark, Idaho was also visited by a mystery helicopter. One witness, Rev. Albert Lambeth, said: “Shortly before 1:00 a.m. Tuesday, I woke up when the intercom picked up a conversation. There was plenty of use of the Lord’s name in vain and a comment that something ‘is a damned shame.’

“I jumped out of bed, thinking there was a break-in at the station and called Farley.  But when we got to the station, everything was normal. So we figured we had picked up a two-way radio signal—that’s happened before.” Farley and Lambeth recalled a “suspicious car” in town earlier that evening (Mark has a population of 20 people).  They both drove out on Davis County Road, and about a mile southeast of town, they came across a “mystery helicopter.”

After a copter scarred cattle on the Francis Jones’s farm, the Iowa State Patrol tried to trail the copter, notifying the Missouri State Patrol that the craft was coming their way, but the copter never arrived.

Dan Richley of Lynchburg, Ohio noted a star-like object on September 26, 1974, about 10:00 p.m. that pulsated colors. Bother Walter Richley and son got into their white pickup truck and shinned a portable searchlight on the object. Suddenly, a red beam came down and engulfed them and the truck. The light disappeared over the horizon. Both pet dogs went crazy during the incident. The following night at 11:00 p.m. Dan heard a terribly loud noise outdoors near the barn.

A calf had died of seemingly natural causes on a Simms, Montana farm. After a few days, a UFO was observed hovering over the animal: a white bean-shaped object with a red top. The object turned upside down before it left the spot. It was later discovered that the calf had its udder surgically removed. The UFO returned the next day to again inspect the cow and finally disappeared.

.

TheDraculaClan Cow ( httpsnypost.com20160905the-shocking-truth-behind-the-10000-animal-mutilations-in-americas-heartland ) pg-195-top-right
https://nypost.com/2016/09/05/the-shocking-truth-behind-the-10000-animal-mutilations-in-americas-heartland/

.

Darlene Underwood and her mother observed two lights that buzzed a train on April 1, 1966 outside of Liberty, Missouri. One of the lights landed on a hill while the other circled, buzzing the train, and then hovered over a tree, dimming its ‘lights’ until the train was gone. The other object rose from the hill, and then both “ducked” behind the hill.  Suddenly, both objects appeared again and ‘landed’ on the hill. Mrs. Underwood said she could hear two men shouting at each other in a foreign language.  The sounds of a pig being butchered could also be heard.  Both women were afraid to approach any closer; however, they could see the shadow of the men moving about. 

A mutilated cow found on the Raymond Jones farm near Newcastle, Wyoming was accompanied by a circle two-foot in diameter to one side, and the grass was a bright yellow at the site. “It was almost a perfect circle,” Weston County Sheriff Willis Larson said. The next night a Newcastle woman reported seeing a flying object west of town; Larson and others saw it too within the mutilation vicinity. “It looked like an orange-colored light,” said Larson. “It was big in the front and tapered down.”

Mutilation areas, as pointed out, are not just UFO “hotbeds”—they are also hosted to strange phenomena.

.

TheDraculaClan Owl ( httpswww.tumblr.comsearchthelonelyowl ) tumblr_oowhxfncwO1w7cj5lo1_500
LARGE CREATURES ARE OFTEN SEEN IN MUTILATION TERRITORIES (Artist Depiction).
https://www.tumblr.comsearchthe%20lonely%20owl.

PART III

TRUCKS, HAIRY MONSTERS, STRANGE PEOPLE    

“At one point there was supposed to be kind of an occult significance as to whether the left ear or the right ear was missing. People would look over what they thought were surgically precise cuts that were made on the side of the animal to see if they represented some kind of an occult symbol.  And then you’ve got the quasi-scientific explanation, which is that these body parts are being biopsied, and they’re being moved by extraterrestrials. I think the UFO explanation now seems to have gotten somewhat old. Now maybe if I were out in the Great Plains, I would find a lot of people out there who were still talking about the “black helicopters.”  The black helicopters were what the aliens used to commit the mutilations and biopsy the animals. And that generated a tremendous amount of rumors and beliefs, all because it was obvious that [the helicopters] were not made by humans because they were silent. A silent helicopter was obviously an alien spacecraft.  I think that all of these will be seen against the ground of real suspicion of the federal government, because they all come with the proposition that the government knows a great deal more about what’s going on than they’re letting on, and the reason they’re not telling you why these mutilations are taking place is because they don’t want you to know.” Bill Ellis, Professor of English and American Studies at Penn State Hazelton, Modern Farmer, Andy Wright, September 11, 2014

When mutilated cattle were reported in the White Meadow Lake area of New Jersey, motorists traveling on Rural Route 15 during October of 1976 were horrified to see dozens of parts of dismembered cows. Heads and entrails were strewn on the roadway for more than a mile. Since the parts appeared near the truck-gate to the United States Army Picatinny Arsenal, the Army was ordered to clean themes up. The Army disavowed any ownership to the slaughter.

People in the area also reported hearing underground construction work and subterranean machinery. There was also the noise of a truck ascending a hill but “never reaching the top.”   A housewife reported a loud, very low-flying helicopter in the area but the area was encompassed in a dense fog. Another resident reported truck sounds in the area going back several years. Beeps, baby cries, howls, unusual footprints, and giant creatures were also reported. One housewife told about a man driving his car to the edge of the woods and taking a sack from his car—removing two legs of a horse and tossing them into the woods before driving away.   In the same area, a dead deer was found with its body “torn open.”

UFOs were replete throughout the area. One resident told about a triangular UFO silently moving and hovering above the tree line. They also observed brilliant flashes about the trees and houses on several evenings. Harmonized orange or white lights traveled across the sky on other evenings.  One glowing light appeared to have landed but the spot could not be found.

Hairy monsters were seen several times. Two children were confronted by a hairy beast with bloody eyes near the White Meadow Lake. Teenagers saw the creature later about a quarter-mile away. Huge three-toed footprints were found. On another occasion, a towering greenish creature with scales was seen along Interstate 80.

In Montana mutilation territory, a large hairy creature was seen standing on the shoulder of Interstate 15 five-miles west of Great Falls. The creature was very wide at the shoulders, about eight-foot tall but didn’t leave any tracks. Leonard Hegele and family also saw a hairy creature off Interstate 15. Hegele gave chase but stopped when the creature stood to face him. Two creatures were reported east of Rainbow Dam along the river. Vaughn, Ulm, and other areas also had creature reports.  The Tennessee area was permeated with “Big Foot” reports during 1976-1977, alongside UFO reports. One witness saw a creature with a rabbit in its mouth and a large Bob Cat as the creatures accompanying ‘pet.’ “MoMo,” the Louisiana, Missouri monster, stalked the area amid UFO reports in July 1972.  In January 1975, a mutilated cow as found in nearby Foley, Missouri. The UFO Study Group of Greater St. Louis made numerous road-trips and Sky Watches; Steve Erdmann was a member on several occasions, and did, indeed, see UFOs. 

Photo Extra Caveman (httpspixabay.comenfantasy-cover-monster-scary-1739989) fantasy-1739989_1280
https://pixabay.com/en/fantasy-cover-monster-scary-1739989/

AUTOMOBILES AND STRANGE THINGS
‘FLAP’ AREAS ARE HOTBEDS

Station wagons, jeeps, trucks that are never identified are also reported.

Clayton Dozier and some of his neighbors found a mutilated 300-pound bull calf on his farm—all three reproductive organs of the bull had been removed by what appeared to be a sharp instrument. Ainsworth, Nebraska investigators said the animal had a “petroleum substance” in its stomach. Interestingly, a helicopter had been reported refueling from a pickup truck in the area. The truck and copter were soon gone before anyone could apprehend them. On the afternoon of the 18th of March, 1977, an early model light-cream-colored vehicle was reported in the Machias, Washington area in which two men accompanied a Doberman Pincher. The slow-moving vehicle went around a corner and about 15-minutes later returned without the dog: the dog had been mutilated along Dubuque Road—cleanly severed in two behind the rib cage. The back legs and its back half could not be found. There was no evidence of blood and the chest cavity was clean and whitish in color.

In the northern part of the Mojave Desert of southern California, hairy beasts were reported to descend from UFOs in the summer of 1973. The UFOs were described as torpedo-shaped and glowing. The creatures were said to ‘amble off’ when they touched the ground.  Later, on July 25, witnesses again tracked hairy creatures in the desert and flatlands area. This time, a convoy of blue trucks carrying military people came and herded a creature into one truck.

“The trucks, which from our vantage point, seemed to bear no identifiable markings, drove almost directly to the Joshua Grove, and the figures of men surrounded the area,” said one witness from the Western Society for the Explanation of the Unexplained.  “A figure, apparently a man, was carrying a powerful light and moved in a hurried manner toward the creature. He seemed to make a violet back-and-forth motion with the light as if directing the creature to come to him.”  The creature let out an anguished cry and entered the truck.  Minutes later, several men swept the area with a flood light, and the witnesses then fled.

Following several mutilations in the Lindale, Texas area, law enforcement officers began looking for a later-model Ford Mustang with an antenna on top of the automobile. The vehicle also had a dealer’s tag. Three people were to have been seen in or near the auto by a motorist on Farm Road 16 east of Lindale. Two persons were seen across a fence in a pasture and, as the motorist stopped, they turned, facing the road—they appeared to be wearing white smocks and butcher’s aprons.   One was reported to be carrying a machete-type knife and the other carrying what looked like a rifle. A third man rose up in the back seat of the car and faced the witnesses, at which point the motorist sped away.

Photos Extra Running Man ( httpwww.alamy.comstock-photoflying-saucers.html ) 1960s-uk-flying-saucers-magazine-cover-detail-EXT1JC
http://www.alamy.com/stock-photo-1960s-uk-flying-saucers-magazine-cover-detail-85350676.html

Gerald Peterson of Viking Township, Minnesota found a mutilated cow on his property on the 27th of September, 1974.  Approximately one week before the incident, Peterson noted a light-colored station wagon on a road near his property.

Boot prints, jeep tire marks, and gunshot wounds are also part of the mutilations.

Cattle found in Ottawa County Kansas had been hit with a high-powered rifle before it was mutilated.  An 1100-pound Holstein found east of Roxbury, Kansas was mutilated and tire and boot prints in the snow were found a short distance away.

The mutilation scenario is replete with all variety and types of odd happenings.

Cattle found mutilated in a mud ditch with no signs of struggle or mud marks. Cattle dropped into ponds with broken legs, hammer marks on the bodies, scalpels left behind—and some kind of ceremonial site was found near Butte, Montana: an alter the sight had ISIS FAVOR US: MOTHER OF MOON, LOVER OF GOODNESS. Likewise, Tom Robinson, a Wilford, Idaho farmer found a white plague with black lettering and a temple-shaped object in its center on a telephone pole at the time of a ‘flap.’ A similar sign was found in Chester.

Two Forest Service guards in Blain County, Idaho watched cattle on the Forest Service property. One guard noted two men dressed in body-length-black-hooded robes walking about 50-yards from him. The taller of the two men carried a hog. Both men preferred to walk in the willows avoiding roads, and acted as if they wanted to avoid detection. The cattle in the area had become very quiet during this time.

In September of 1976, a boy was fishing alone on the Cheyenne River near Kindred, North Dakota and he spotted a figure dressed in a long white robe. Similar reports of persons dressed in black robes carrying candles along County Highway 46 were reported in North Dakota.  White-robed people carrying candles ere reported in the Valley City area. Kindred Mayor Jerry Salveson told about a bull which died on the Rodney Lee farm unknown causes.

Two mystery men invaded a feedlot southwest of Sterling, Colorado in August of 1976, a previous mutilation site. Ranchers said: “They didn’t move like humans, they seemed to glide.” The sheriff was summoned but could find nothing—and no footprints could be found.

TheDraculaClan People ( httpswww.coasttocoastam.comshows20160526 ) images
Some Areas Were Visited by Mystery Men
https://www.coasttocoastam.com/shows/2016/05/26

One of the most bizarre reports came from Arlen R. Box who said a helicopter came over a field near Henderson, Texas on a day when cattle had been mutilated. Box watched from his tractor as the coal-black copter “with no one at the controls” flew over him “like a bat out of hell.” Several days later as he drove his pickup, he witnessed a “black creature coming out of a pine grove—it seemed black,” he said, “and I swear, it had wings” because the creature flew up to the copter before the craft disappeared.

In almost every state and some foreign territories, Swamp Things, Wall Bangers, Night Screamers, Giant Lizards, Hairy Dwarves and other monsters are reported and animals killed. The phenomenon has persisted from the 1970s down to the present day.

 TO THE PRESENT DAY       

Listverse had an insightful article and chronology of the continued mutilations happening globally.

Marcus Lowth, June 29, 2016.  https://listverse.com/2016/06/29/10-modern-day-accounts-of-animal-mutilations/

Writing for the New York Post, September 5, 2016, Ben Mezrich (following the investigations of Chuck Zuklowski), uncovered the strange consistency of mutilations over the years leading up to the current time:

Even more terrifying, incidents like this had been going on for more than fifty years — this exact same scene had been witnessed and documented on ranches all over Colorado, as well as in New Mexico, Arizona, Utah and many other places — decade after decade.
“What had occurred on Glenda’s 〈a farmer’s〉 ranch — as violent and horrifying as it was — was part of a phenomenon made up of more than ten thousand individual incidents, in a half-dozen states — all of them completely unexplained.”
https://nypost.com/2016/09/05/the-shocking-truth-behind-the-10000-animal-mutilations-in-americas-heartland/.

TheDraculaClan Howe ( httpwww.dailymail.co.uknewsarticle-4651410Cattle-mutilation-40-YEARS-stumps-FBI-farmers.html ) 41C7670B00000578-4640906-image-a-6_1498568227356
httpwww.dailymail.co.uknewsarticle-4651410Cattle-mutilation-40-YEARS-stumps-FBI-farmers.html.

Anna Hopkins of the Dailymail.com (June 29, 2017) concurred (following the investigations of researchers Christopher O’Brien and Linda Moulton Howe).   Mutilations were discovered as recently as 2016 in Kansas.  O’Brien points out that since 2002, about 4,000 mutilations were found just in South America.
http://www.dailymail.co.uk/news/article-4651410/Cattle-mutilation-40-YEARS-stumps-FBI-farmers.html

Sputnik News (February 8, 2017) interviewed Chuck Zukowski who has been investigating the mutilations (along with  Linda Howe and other investigators such as Nick Pope [formerly of the UK Ministry of Defense]),  through to its present modern era, and discovered mutilations followed the same consistent pattern of bizarre mysteriousness today.

TheDraculaClan Chuck ( httpsnypost.com20160904this-investigator-chases-aliens-along-americas-paranormal-highway ) chuck_invest3
Chuck Zukowski in Investigatory Uniform
https://nypost.com/2016/09/04/this-investigator-chases-aliens-along-americas-paranormal-highway/

“The cattle mutilation mystery is extremely disturbing, and there are many different theories, including predator activity, Satanists, secret military experiments, and extraterrestrial activity. The theory about military involvement makes no sense, because government scientists already have a facility where animal testing is carried out, so they would have had no need to conduct additional, illegal testing.  However, I was not able to find a definitive explanation during my government work,” Nick Pope told Sputnik.
https://sputniknews.com/us/201708011056085483-animal-mutilation-aliens-abduction/.

In many modern cases artificial mutilations are evident, and in one or two cases, traces of materials were analyzed that might indicate chemical injections.
http://www.theblackvault.com/casefiles/analysis-vitreous-fluid-cow-8-mutilated-april-7-2003-valparaiso-nebraska/.

WHENCE THE CLAN?

There are six broad theories as to who is behind the mutilations:

— A highly sophisticated and wealthy clan of Satanists, including the Central Intelligence Agency and other Deep State officials and professional people, including psychiatrists on down to farmers that are dedicated to bringing about the Biblical Armageddon.

— Our U.S government, possibly, along with other governments, are involved in psychological warfare on the citizenry. Theorists remind us of the recent disclosures about the Central Intelligence Agency’s involvement with Mind Control during the 1950s-1960s. The Army Missile Command was also awarded contracts in 1975 to develop laser weapons. HELAW (helicopter mounted laser weapons) were being built by Bell, Boeing, and TRW.  INLAW (Infantry laser weapons) was another program. There have been many clandestine government programs. The late scientist Dr. Leon Davidson was an advocate of this theory that government intelligence agencies had a part in creating the UFO mystery. Some researchers, utilizing ‘all‘ the information, have suggested that a hidden “break-away society” is also behind this and involved in some kind of ‘alliance’ with the phenomena.

Artist Depictions of the Hidden ‘Break-away Society.’

TheDraculaClan ( httpswww.pinterest.compin396246467198460079 ) ea2cb7dd23ec350ca5c7195d1b2eccfa
Photos Extra Future ( httpstarwars.wikia.comwikiTemple_SpireLegends ) Ruinsoftowers
https://www.pinterest.com/pin/396246467198460079/  (TOP)
http://www.neoseeker.com/star-wars-the-force-unleashed/screenshots/ (BOTTOM)

— The government is sponsoring secret germ warfare programs using livestock and other animals as a nationwide, even global, laboratory. Upon autopsy, many cattle were found infected with germs. If this theory is true, it has worldwide implications because mutilations were found, for example, in Puerto Rico where ducks, goats, rabbits, geese, cows, pigs, dogs, and cats were found mutilated (allegedly caused by a mythical creature from atomic experiments).

— Visitors from outer space using helicopters and other terrestrial craft as “disguises,” going about collecting animal tissues, limbs, and blood (also terrifying citizens for unknown reasons). A case is mentioned of a March 1967 UFO which chased a Red Cross bloodmobile driver Beau Shertzer near Huntington, West Virginia. An arm came down from the craft as it hovered over the mobile vehicle, and a nurse saw another arm with pincher-like devices.  An oncoming auto scared the mechanical vampire away.

— A “specialized” version of haunting. The general abnormal phenomena that are possibly connected are but “ghost” phenomena or apparitions similar to what happens in poltergeist activity or séances and Spiritism. A sci-fi theory is that this activity is a manifestation of our subconscious taking control in a physical ‘format’ at times—and advocates point to the ID Beast from the book and movie THE FORBIDDEN PLANET.

TheDraculaClan ID Beast ( httpsdigitalculturist.comhave-we-unleashed-the-monsters-a603325a5a85 ) 1_mZDRQgH2LmkGqVnO35Q2Qw
Artist Depiction  of the ‘ID Beast’ From the Movie THE FORBIDDEN PLANET
https://www.stormfront.org/forum/t1227777/

Several deputies in one county decided to “stake out” 640 square acres during the night. Farmers and ranchers helped close off roads and set-up the required surveillance. Alternate communication systems were used so that calls could be monitored. All cars were stopped and checked in the back roads. When morning arrived, and nothing seemed to have happened, one deputy received a call from a farmer who found a mutilated horse near the center of the 640-acre “target section.” A quarter horse had been drained of blood with several puncture wounds in the chestThere were no tracks.

— A combination of all of the above in some synchronized Jungian Meaningful Coincidence.

A NEW WORLD ORDER

What we have here may best be described, in the words of author Joseph Farrell[1], as the “enemy that is everywhere and nowhere.” Others have given it various titles, such as The New World Oder or the “Illuminati.” Adventofdeception.com, “The Illuminati Evil Earthly Organization,” describes it thus:

“Humans thrive on power, domination, and secretiveness. The evil Illuminati structure of hierarchy resembles the pyramid, beginning with the ‘file and rank,’ informers, runners, etc., rising to the top councils of the ‘Grand Drude Council’ and the ‘Olympians,’ the mind-controlling professionals.
“This is a short overview of the Illuminati and that covert and direct mind control is occurring around the world. There’s tons of information on the Internet about the Illuminati. Through detailed research, the reader will understand the deep level of darkness that this world is subjected to. Within this realm of humans—the light is void out and replaced with direct satanic worship. Royalty and wealth are a captivating lifestyle, though the path of Luciferian darkness will crouch at the door.”

Photos Extra Puppet ( httpswww.pinterest.compin401101910533067058) ec88d4955a718ce714bd459d536a370e
CONTROLLED BY THE NEW WORLD  ORDER
https://veilofreality.com/2016/08/02/timeline-reality-split-frequency-vibration-and-the-hidden-forces-of-life/

TheDracularClan ( httpswww.pinterest.co.ukpin575546027360654073 ) 56dcbb749a59af206147f373d21677f1--yb--flying-wing
http://wingsfan.blog64.fc2.com/blog-entry-10797.html
******
Steve Erdmann, January, 2018, St. Louis, Mo.
*******
You can reach Steve Erdmann – at  –  dissenterdisinter@yahoo.com  or   independenterdmann@gmail.com.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can friend him at:
Facebook – https://www.facebook.com/stephen.erdmann1 –
Or – visit the Dissenter/Disinter Group –https://www.facebook.com/#!/groups/171577496293504/.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can also visit his articles at the following:
http://www.minds.com,
http://www.ufospotlightwordpress.com,
http://www.ufodigestblog.wordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/.
*******
[1] https://wordpresscom507.wordpress.com/2017/06/17/joseph-farrells-hidden-empire-trilogy/
*******

.

Photos Extra Nazi Wing ( httpwww.darkroastedblend.com200904wonder-weapons-of-world-war-two.html ) truketyjtrhdgbf
*******
JosephFarrell'sHidden Phot of cars the-area-around-the-world-trade-center-was-a-scene-of-utter-devastation-smoke-and-dust-hung-in-the-air-countless-cars-trucks-and-emergency-vehicles-wer
The-area-around-the-world-trade-center-was-a-scene-of-utter-devastation-smoke-and-dust-hung-in-the-air-countless-cars-trucks-and-emergency-vehicles-were-destroyed.
*******
Photos Extra Craig Walking ( httpwegotthiscovered.commoviescheck-daniel-craig-james-bond-skyfall-images ) 7bc9585c_smush_skyfall06
James Bond:  “Some men are coming to kill us. We’re going to kill them first.”  (Quote from movie SKYFALL.)
http://www.indiewire.com/2012/11/will-skyfall-finally-win-cinematography-legend-roger-deakins-an-oscar-104269/
*******

Photos Extra Steve2 34962959_10156520897759595_6984102889039855616_n

Steve Erdmann, Independent Investigative Reporter

Another version of this article can be seen at The Clan of Death – – https://wordpresscom507.wordpress.com/2020/06/07/

The Military-Industrial-Corporate-Complex-Matrix (MICCM)

Photos Extra Red1 ( httpspsych2go.netdr-helen-fishers-4-love-types ) devil

https://www.desktopbackground.org/wallpaper/hd-satan-devil-hell-wallpapers-ultra-hd-full-size-hirewallpapers-7659-705050

The Military-Industrial-Corporate-Complex-Matrix (MICCM)

Introduced by:
Steve Erdmann and Watchers Talk 

Watchers Talk

Another version of this article can be seen at The Military-Industrial-Corporate-Complex-Matrix (MICCM) – https://wordpresscom507.wordpress.com/2020/06/07/stephen-erdmann-trust-and-foundatin/wordpresscom507 – Stephen Erdmann Foundation-Dissenter/Disinter Magazine

Streamed live on Jan 13, 2018
An Anniversary Celebration of General Dwight Eisenhower’s January 1961  Speech

“Capitalism – its opportunistic character hidden beneath the guise of patriotism, democracy or whatever label is suitable to the occasion.”

“What is clear is that big business is now firmly ensconced at the center of government. No longer is there any pretense of government representing the people.” 

The Bush Family Saga – Airbrushed Out of History, William Bowles, Global Research, June 24, 2005.

*******

“Mr. Pawelec was close enough to very high level insiders at the cutting edge of technologies being prepared it appeared for mass implanting of humans. This is a scary interview but a very important one and I personally thank Steven Greer for having the decency and trust to keep this safe until this moment and for his great courage to go where many fear to tread. He truly deserves our support. 
There is more to come…”

Billions of Chips Ready to Implant – the inventor’s testimony before he died – December 30, 2010.   

http://www.colinandrews.net/Greer-Pawelec-Testimony.html
*******

“‘The Powers That Be’ stole the technology. Two of those friends were assassinated and Bill’s own death remains suspicious.” It should be explained that a RFID chip is a tiny radio-frequency identification chip that is small enough to inject into animals and humans for monitoring purposes. Pawelec speaks about this in his video interview with Greer. There is a link to the video at the end of this article. Pawelec was shaken to the core at a secret meeting ‘Another project Bill worked on was at Area 51,’ Annie continues. ‘It was his job to upgrade the perimeter security systems for Area 51 and it was his idea to install cameras in fake rocks. It was during this time that he learned about the Tonopah base which is more remote and inaccessible than Area 51. It also was where Bill’s rose-colored patriotic glasses began to cloud over.'”

William Pawelec’s Widow Reveals National Security Secrets – Wes Penre – November 9, 2011.

https://battleofearth.wordpress.com/2011/11/09/william-pawelecs-widow-reveals-national-security-secrets/
******

“Much of the evil stems from the fact that free-market economists who still dominate the Ivy League and the policy circles have focused on markets at the expense of those inconvenient encumbrances known as ‘people’ Their fancy mathematical models make calculations about buying and selling, but they tend to leave out one important thing: production. In other words, they don’t give a hoot about the labor of those who sustain the economy. Their perverted religion may have something to say about unemployment or wages – keeping the former high and the latter low — but the conditions workers face receive nary a footnote.”

Fifty Shades of Capitalism: Pain and Bondage in the American Workplace – Lynn Sturrt Parramore – Alternet -July 2, 2012.

https://www.alternet.org/story/156291/fifty_shades_of_capitalism%3A_pain_and_bondage_in_the_american_workplace.
*******

“Parts of this shadowy network — the Council on Foreign Relations, the Trilateral Commission, Bilderberg, and more — are sometimes visible to the public, even if the establishment media rarely highlights the significance. Other powerful elements are practically invisible: Secret societies such as ‘Skull and Bones’ and the Bohemian Grove, for example, which will be described in an upcoming article. But combined, it is clear that the Deep State behind the Deep State wields tremendous power over America and the world. The agenda is becoming clear, too. And if left unchecked, this powerful network of ‘Deep State’ operatives fully intends to foist a draconian system on humanity that they often tout as the ‘New World Order.’ But the American people have the power to stop it.”The Deep State Behind the Deep State: CFR, Trilaterals and Bilderberg – Alex Newman, November 3, 2017, The Liberty Beacon.

http://www.thelibertybeacon.com/the-deep-state-behind-the-deep-state-cfr-trilaterals-bilderberg/.
Photos Extra Chips1 ( httpswww.express.co.uknewsweird703856MARK-OF-THE-BEAST-Secret-plan-to-implant-us-all-with-ID-chips-by-2017 ) Simon-parkes-634189
https://www.express.co.uk/news/weird/703856/MARK-OF-THE-BEAST-Secret-plan-to-implant-us-all-with-ID-chips-by-2017
*******
Photos Extra NWO1 ( httpswww.dreamstime.comstock-image-new-world-order-image20943221 ) new-world-order-20943221
https://www.calvaryadvisor.org/the-abolition-of-man
********
You can reach Steve Erdmann – at dissenterdisinter@yahoo.com or independenterdmann@gmail.com.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can friend him at:
Facebook – https://www.facebook.com/stephen.erdmann1 –
Or – visit the Dissenter/Disinter Group –https://www.facebook.com/#!/groups/171577496293504/.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can also visit his articles at the following:
https://ufospotlight.wordpress.com/2020/01/05/the-miccm-is-also-illuminati/
 http://www.minds.com – TheDissenter,
http://www.ufospotlightwordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/,
https://www.facebook.com/TheUniversalDigest/?__tn__=%2Cd%2CP-R&eid=ARB3i9eJwirzOvkPMA5RwMhIUX-3xSP69ME1YHZhQjeSqnxoiNgzhKt1WVX8EUlupUgLBVzd_mX-VXAN

*******

Photos Extra Steve1 34934490_10156520897824595_8244253719684710400_n
Steve Erdmann – Independent Investigative Journalist
This article can also be seen at https://ufospotlight.wordpress.com/2020/01/05/the-miccm-is-also-illuminati/

Or:

The Military-Industrial-Corporate-Complex-Matrix (MICCM) – https://wordpresscom507.wordpress.com/2020/06/07/stephen-erdmann-trust-and-foundatin/wordpresscom507 – Stephen Erdmann Foundation-Dissenter/Disinter Magazine

The UFO Spotlight on: Senator Ted Cruz & Colleagues Submit Amicus Brief To Supreme Court

Senator Ted Cruz

& Colleagues Submit Amicus Brief To Supreme Court in Brnovich v. DNCRIEF SEEKS TO PROTECT STATES’ AUTHORITY TO ENSURE THE INTEGRITY OF THEIR ELECTIONS

December 7, 2020  |  

WASHINGTON, D.C. – U.S. Sens. Ted Cruz (R-Texas), Tom Cotton (R-Ark.), Rick Scott, (R-Fla.), Mitch McConnell (R-Ky.), Thom Tillis (R-N.C.), James Inhofe (R-Okla.), Mike Lee (R-Utah), James Lankford (R-Okla.), Marsha Blackburn (R-Tenn.), John Cornyn (R-Texas), and Mike Braun (R-Ind.) today submitted a joint amicus brief to the Supreme Court of the United States in support of the petitioners in the case of Brnovich v. Democratic National Committee and in defense of laws that combat election fraud.

The amicus brief argues that the Voting Rights Act does not prevent states from enacting neutral election integrity measures like Arizona’s ban on ballot-harvesting, or other measures such as in-precinct voting requirements, voter ID requirements, election observer zones, and straight-ticket voting.

The full text of the amicus brief may be viewed here. Excerpts are below.

“‘The risk of voter fraud [is] real.’ As this Court has repeatedly confirmed, States have the authority and responsibility to ensure the integrity of their elections. These measures do not deny anyone the equal ‘opportunity’ to vote ‘on account of race or color.’ […]

“In the past decade, plaintiffs have pushed an aggressive Section 2 of the Voting Rights Act theory seeking to invalidate voting laws regulating absentee voting, precinct voting, early voting, voter identification, election observer zones, voter registration, durational residency, and straight-ticket voting. […]

“In the past few years, many recommended election-integrity regulations–which impose no more than ‘the usual burdens of voting,’–have been challenged in a wave of novel Voting Rights Act litigation. […]

“Were this Court to adopt the sweeping interpretation […] advocated by Respondents, these recommended laws and other neutral time, place, and manner voting laws would be put in grave danger across the country.” 

Senator Ted Cruz

202-228-7561

HOME  /  PRESS OFFICE  /  PRESS RELEASES

The Nazi Fourth Reich

Joseph Farrell’s Nazi Trilogy Redux – https://wordpresscom507.wordpress.com/2020/06/07

Investigative Reporting

Joseph Farrell’s Nazi Trilogy Redux

Posted on  by steve erdmann     

Farrell's Redux Photos ( httpswww.anmysite.comtopwallpaper-nazi-ss.html ) 38884494-nazi-wallpapers
Farrell's Redux Photos Redux ( httpswww.zerohedge.comnews2017-10-29how-elite-dominate-world--part-5-endgame-complete-and-utter-global-domination ) 20171029_nwo

Photos Extra Nazi Wing ( httpwww.darkroastedblend.com200904wonder-weapons-of-world-war-two.html ) truketyjtrhdgbf

A FANTASTIC TRILOGY OF FARRELL’S FUMAROLE FOLKLORE

By:

Steve Erdmann

Redux
This article was previously published in the December 2017 issue of Alternate Perception Magazine, and is being reproduced with permission.   Editor Brent Raynes has been the editor since 1985 and has done extensive investigation into  paranormal topics.  He is author of  Visitors from Hidden Realms (2014).
http://www.apmagazine.info
A Fantastic Trilogy of Farrell’s Fumarole Folklore
http://apmagazine.info/index.php?option=com_content&view=article&id=1069&Itemid=256

(Harry Cooper-Sharkhunter – Bariloche near Stadt)  “…according to people Cooper interviewed, General Eisenhower even visited the hotel sometime during or around 1954…was Eisenhower being ‘vetted’ for his suitability as a presidential candidate by this group, in a Bohemian Grove or Bilderberg Group style meeting? Or was Eisenhower being told ‘the way things really are’?…Eisenhower may not have been talking solely about the American military-industrial complex at all…the Nazi international was not only alive and well, but well-equipped, well organized, and self-evidently well-funded.”  (Nazi Internationalpp301302)

“It was to be an expansion, on a far grander scale of the previous machinations of the Dawes and Young Plans that led to the creation of the I.G. Farben in the first place. Negotiate, penetrate, infiltrate, and cartelize all transfers of technology, with Germany and the Party interest solidly at the core; these were the watchwords of Borman’s emerging Nazi International.”  (Nazi International, p. 73)

(Nazi International: The Nazi’s Postwar Plan to Control Finance, Conflict, Physics and Space, Joseph P. Farrell, Adventures Unlimited Press, One Adventure Place, Kempton, Illinois 60946, www.adventuresunlimitedpress.com, 2008, 413 pages, $19.95.)

****

“…the finance of terrorism is, one, synthetic and, two, so large that terrorist ‘finance’ is extricable woven into the financial structure to the extent that amend to the war on terror could only come about with an end to the current global financial system.”  (Covert  Wars, p. 164)

“What we have now discovered is a vast-covert-operations slush fund, a hidden fund, involving billions of dollars in securities and stolen and re-hypothetical bullion, one based upon permanence or semi-permanence, in keeping with the total culture of total power not billions (but probably)…is in trillions.” (Covet Wars, p. 210)

Covert Wars and Breakaway Civilizations, Joseph P. Farrell, Adventures Unlimited Press, One Adventure Place, Kempton, Illinois 60946, www.adventureunlimitedpress.com, 2012, 371 pages, $19.95. 

****

“That financial alliance came about as a result of bargains struck with the former Axis elite after World War Two, to gain access to a vast supply of loot, loot which could be kept off the books, and fuel an enormous postwar expansion of secret in-structure, the development of black, exotic technologies, and covert operation…knew the practices of the occult, and sacrifice, very well…” (Hidden Finance, p. 258.)

“…a ‘breakaway civilization’ that secretly emerged because of its decades’-long access to secret funds…exploitation of Axis loot…vast war chest to fund the secret development of various exotic technologies…Nazi organizations, with it s own deep ties to the criminal underworld, drug trafficking, and, of course, to Islamic radicalism and terrorism.”  (Hidden Finance, p. xxx)

(Hidden Finance, Rogue Networks and Secret Sorcery: The Fascist International, 9/11, and Penetrated Operations, Joseph P. Farrell, Adventures Unlimited Press, One Adventure Place, Kempton, Illinois 60946, www.adventureunlimitedpress.com, 2016, 269 pages, $19.95.)

A Secret of Great Magnitude

Joseph Ferrell is certainly a foremost investigator into paranormal and esoteric subjects, having written numerous books on conspiracy, UFOs, and things largely mysterious. In the trilogy of the books mentioned within this article, Ferrell outlines the continuance of a global elite after World War II, how it built a hidden economy of vast proportions, and then exerted its power and technical ability in the destruction of the Twin Towers on 9/11.

PART I
Extraterritorial Nazi State

Ferrell tells of plans of the Third Nazi Reich to survive the war and continue as a clandestine Fourth Reich, a postwar Nazi International, continuing to develop their “most advanced technology.” Dr. Carol Rosin, a long-time American associate of Nazi Operation Paperclip rocket scientist Wernher von Braun, was allegedly told by Von Braun prior to his death in 1973, “that the world’s elite had a long-range plan for the control and manipulation of the population in response to various ‘perceived enemies.’’’ (Nazi International, p. 41)

.

Farrell's Redux Photos ( httpswww.anmysite.comtopwallpaper-nazi-ss.html ) 38884494-nazi-wallpapers
A Long-range Plan to Control
https://www.cineserie.com/movies/432850/

This geopolitical agenda was to create a third bloc of nations, including two superpowers, in conjunction with the creation of an extra territory Nazi ‘state,’ the long-term goal was World Corporate Socialism. Special licensing arrangements emerged between the Western Powers, the United States, and Germany, resulting in an international corporate cartel.

Hitler’s first Reich bank president, Dr. Hjaimar Horce Greeley Schacht, typified the “pattern of incestuous relationship” between the American corporate elites and Germany. It existed in Morgan Stanley elites and Germany.  It existed in Morgan Stanley and Standard Oil investments of millions of dollars American I.G. Chemical, Du Pont, Alcom, Dow Chemical, and the growth of German I.G. Farben.

Prescott Bush’s business dealing s with German Fritz Thyssen, and other such dealings enabled

Nazi Party Reichsleiter Martin Bormann, following the I.G. Farben’s models of expansion to safe havens abroad, an option codenamed Akton Feuerland, Operation Fireland.   Such an operation utilized underground vaults, as well as U-boats to connect with the far reaches of Argentina. In 1942, Bormann’s Project Bernhard created $600,000,000 of counterfeit British pound notes. 

“Bormann, in short, was a professional Nazi, aiming to maintain the Party, its power, and agenda and to give its institutions and goals permanence.” (Nazi International, p. 67) 

Bormann’s “Auslands-Organization” expanded from a watchful eye on German’s “Fifth Column Network” into an “extensive industrial espionage” cabal as outlined by Obergruppenfurher  Dr. Johann Friedrich Scheid in a secret conference that included major firms of great importance connecting many American companies as far as Spain and South America.

Bormann worked with the likes of Allen Dulles and German military intelligence Chief General Reinhard Gehlen and a “nominal CIA control” over-shadowed by Nazi Germany’s “military intelligence.”  It was collusion with the United States government.  (p. 80)

Corporate Fifth Columns

The new Nazi cabal worked in massive amounts of false fronts, dummy corporations, fifth columns, vast networks of finance agents and lawyers, extending to John D. Rockefeller or J.P. Morgan, a “Nazi International to conduct not only espionage but research in its own right…connected to the Party in the surface, but deeply connected to it covertly.”  (p. 82)

(Stalin, the Russian leader, said Bormann escaped in a fleeing U-boat.)

Ssobergruppenfuhrer Dr. Ing Hans Kammler, similarly, headed a think tank, harboring German secret weapons research and a slave labor pool of about 14 million people. Bormann exerted hidden and hard control in bargaining with his American counterparts, forcing them cover and camouflaged dummy corporations and protection of secret plans. This included secret weapons such as “The Bell.”

Massive amounts of liquid capital and assets were transferred to hide-outs for both: funds, and, Nazi personnel to Latin America, the Middle East, Spain, ‘black’ U-boats, pro-Nazi factories, and “various puppet governments of Europe.” Farrell indicates alliances were made as far as postwar radical Islam.  “…probable shadowy connections between the Nazi International and Al-Hussein.”  (p. 191)

A peculiar relationship existed between German military intelligence mastermind Richard Gehlen and Allen Dulles, brother of John Foster Dulles of the lawyers involved in the eventual forming of the Central Intelligence Agency (CIA).

Ferrell gives concern to the rise of pro-Nazi sympathy about the globe, such as in Arabia, Egypt, Italy, Turkey and other places (pp. 193-200).

A significant mystery was German intelligence agent Andreas Strassmeir who was loaned to the U.S as an undercover agent. Strassmeir, according to several witnesses, was seen in the company of Oklahoma bomber Timothy McVeigh. When Strassmeir was arrested in a roadblock, every effort was made to obtain his release, including the deployment of a German GSG-9 security force.

While in America, Strassmeir associated with white supremacy religious groups in Oklahoma and underground Neo-Nazi groups, often giving training in survival tactics and guerrilla operations.

Continued Reunification and New Directions

Neo-Fascist and radically Rightwing Nationalist groups grew throughout Eastern Europe, a mix of socialism and capitalism. Dissemination was created through a Neo-Nazi computer network called the Thule network. What was emerging was Hegalian East German Third Position Reform. Martin Bormann’s Nazi International “was alive, well, and able to mount a coordinated effort…still well-organized, well-financed…”  (pp. 224-225)

One of the areas in which Neo-Nazism appeared was the use of double intelligence agents, made into triple agents operating from a “third position.” This was clearly in line with Gehlen’s spy organization and its nefarious link to Allen Dulles and the early CIA. Gehlen and his bundesnachrichtendienst were an integral part in Bormann’s Nazi International design to smuggle Nazi personnel to safe havens in Latin America and the Middle East. 

Roots of a two-pronged Nazi Monster began in the arenas of science (with scientists such as Cornelius Jan Bakker, a leading nuclear physicist working on Huemul Island) and Prince Bernhard of the Netherlands, who was a founder of the mysterious Bilderberger Group (Bernhard was a former Nazi SS soldier/employee of I. G. Farben, officer in Butch Oil) as the political prong.  These two tools can be traced through the years:

# I.G. Farben’s exotic technology existed at their laser isotope enrichment facility, the Bariloche fusion project.    

# Argentina’s Juan Peron announced that his Nazi contingent had by-passed fission power and had gone to fusion power.

# German scientist Ronald W. Richter was very advanced in shock wave research, The Atomic Bomb Project, which included high-spin atomic nuclei, levitation, a torsion bomb, space-time energies, and “The Bell.”

# General Reinhard Gehlen effectively took over American intelligence as his “network,” poisoned the CIA’s civilian character and became a “network of the Nazis.”   Robert H. Jackson,

U.S. chief prosecutor at the Nuremberg trials and President Harry Truman knew of the penetration of the CIA.

# J.P. Morgan and also Nelson Rockefeller were paying big dividends to Bormann through American banks as late as 1967.

# German scientists under Walther Gerlach and Kurt Drehner experimented with deuterium and high explosive-driven convergent shockwaves—weaponization far beyond atomic or hydrogen bombs. Dr. Jose’ A. Balseiro spoke of the use of magnetic field production on Lithium-7 through radio frequency generators.

.

Wolfenstein® II: The New Colossus™_20171030193230
Wolfenstein® II: The New Colossus™_20171030193230
Secret Experiments Led to a New Direction

Farrell cites researchers Richard Hoagland and Mike Bara’s Dark Mission which outlined the deep occult and esoteric traditions that the so-called Fourth Reich still operated under, clearly connected to Hitler’s and the Third Reich’s heritage.

Nazi Occultism, Hidden Space Program, and Esoteric Symbolism

Operation Paper-Clip was an intrinsic part of the new Reich into America, though those scientists were mainly inducted into the U.S space program. The authors said such programs were programs secretly advanced behind the scenes.

One such mysterious inconsistency of such a Hidden Enterprise revolves around why Apollo 10 didn’t take place. The reasons are traceable back to the further penetration of Nazism in America and also their occult practices.

Apollo 10 did not fulfill some hidden requirements of an Egyptian agenda of a very deep level of planning—lunar landings had been on the 20th of April (1967 and 1972) which was Adolf Hitler’s birthday. The Nazis believed they could be traced back to the Aryan race and the colonization of Sumer and Egypt. 

Other mysterious connections surrounded Carlos Miguel Allende and his letters to Dr. Morris Jessup (1955-1958) which spoke of the Philadelphia Experiment and Albert Einstein’s Unified Field theory, anti-gravity, and cosmic war. A Varo edition told about Wernher von Braun connections to German physicist Burkhardt Herm. Herm visualized a sixth-dimensional spinoriented fullquantized theory of spacetime.

Near 1970, the Torbitt Document alleged that the involvement of Wernher von Braun into the Kennedy Assassination. It was New Orleans District Attorney Jim Garrison, however, that in 1967 uncovered many Nazi connections behind the assassination. Clay Shaw, a major player, “vetted Paper Clip Nazis.” 

A Vast System of Operation

In a Hotel Maison Rouge meeting in Strasbourg, France, Bormann carried out Hitler’s desire “to create a vast system of dummy and front corporations to evacuate liquid assets, crucial scientific and technical personnel, and actual technology outside the Reich…gain power over as much of the world by whatever means possible, and hold onto it…much like the pronouncements, one hears coming from the global corporate elite today…”  (pp. 390-391)

When the Lunar Excursion Module landed on the moon on July 20, 1969, the announcement was: The Eagle has landed. But Farrell interprets this differently: “It was someone else’s eagle___one with a Swastika surrounded by oak leaves clutched in talons___that had filed the flight plan.”

Part II

In Farrell’s Covert Wars and Breakaway Civilizations tome, Farrell expands his overriding thesis that a post-war Fourth Reich continued and knew about an immense multi-billion-dollar “slush fund” of counterfeit currency, often referred to as gold bonds, but might also be encoded to mean drugtrading. That such an operation gave them much-hidden control over the economies of the world, by holding these mystery assets in trading coups that gave them enormous leverage to help finance revolutionary technologies, such as “The Bell” and various extreme inventions such as flying saucer equipment.                                                                                                                      

“In other words, the technology was intimately tied to the financial community, and to the vast underground of the national drug cartels and criminal syndicates,” says Farrell, “…’rogue group,’ an international ‘breakaway group’ operating entirely on its own…a core of intelligence operatives, rogue military men, technocrats, and, of course, corrupt, or compromised, bankers.”  (Covert Wars, pp. 123-124)

Hidden Financial System

A short list of hidden and rogue funds run a gamut which included Operation Gold Lily, Japan’s M-Fund,  Foundation X, Operation Bernhard, the 57 Bond, Federal Reserve Bonds, the Bank of Credit and Commerce International (BCCI), Operation Morganthaus, as just a few of the Havens, conduits and hidden overseers. Coincidentally, many of the “bonds” issued had a 1934 date, demonstrating their illegitimacy. Such counterfeiting was also used to “wreck” economies, as was done to the British war economy.

These large caches were often rehypothecated several times in huge financial schemes of fraud, leveraging even more credit, allowing this breakaway civilization to fund gigantic projects of covert operational nature. Such secret funding probably entailed clandestine space research and even the purchase and collateralization of planets.

Farrell's Redux Photos Redux ( httpswww.zerohedge.comnews2017-10-29how-elite-dominate-world--part-5-endgame-complete-and-utter-global-domination ) 20171029_nwo
Secret and Rehypothecated
https://www.zerohedge.com/news/2017-10-29/how-elite-dominate-world-%E2%80%93-part-5-endgame-complete-and-utter-global-domination

“…the breakaway civilization is in part ‘a banking fraud and counterfeiting scheme, with particle beams, lasers, grazers, anti-gravity, and covert operations.”  (Covert Wars, p. 157)

The National Security Council in 1948 established on its own authority the Office of Policy Coordinator, with covert operations under the direction of its chief, Frank Wiser. Edward Lansdale, a military assist, and intelligence officer embodied a “coalescence of interests,” resulting in Operation Golden Lily. Lansdale was transferred to the U.S. Air Force by General Hoyt Vandenberg, the U.S. Air Force Chief of Staff. After attending the Strategic Intelligence School of the U.S. Air Force in Colorado, he was transferred to Frank Wisner’s Office of Policy Coordination at the CIA, and then back to the Philippines to oversee the recovery of the Golden Lily loot.

It was Vandenberg who (serving twice as the U.S. Air Force Chief of Staff and as a CIA director) had held superior offices to General Nathan Twining. Twining was head of the Air Force Air Materials Command at Wright Patterson Air Force Base in Dayton, Ohio.  Vandenberg ordered Twining to New Mexico to participate in the Roswell UFO incident, as well as receiving reports from General Ramey at Roswell. Vandenberg was also an alleged member of the controversial secret study group, MJ12.

Lansdale was interfaced with the UFO phenomenon, ultimate technological projects, and notorious CIA-Nazi- International havens, including Eisenhower’s Secretary of State, John  Foster Dulles, and his CIA – Wall Street lawyer brother, Allen Dulles. This curious blend of a “UFO arm,” Big Money, and covert warfare, became known as The Enterprise. Enter, various front companies such as Centremondiale Commercial and the Permindex Corporation, one of the many fronts by which fascist financiers operated. Prior to the creation of the CIA, Allen Dulles created the World Corporation, which led to World Trade Centers throughout the world, such as the World Trade Martin New Orleans (associated with CIA agent Clay Shaw of the Jim Garrison-Kennedy assassination fame).

One of the biggest covert operations by The Enterprise, beyond bullion theftgold price fixing, was the engineered economic collapse of the Soviet Union. The ability to accommodate such feats became known as full spectrum dominance.

Farrell's Redux Photos ( httplonkeropiirakka.blogspot.com201204leffamielipide-iron-sky.html ) Iron Sky konsepti ufo-ohjaamosta
They were Equipped for Full Spectrum Dominance
http://hdwall.us/high-definition-wallpaper/dscn0455-lets-have-alternate-history-retro-sci-fi-desktop-hd-wallpaper-960044/

“…control everything, everywhere, including the high seas, land, air, space and even cyberspace…from the galaxy to the mind…to win a war at any level of violence including nuclear war.”  (Covert Wars, p. 215)

Weather Warfare and Electromagnetics

Farrell expounds on the various indications that said various forms of electromagnetic weather warfare may exist, even giving further into Maser, Laser, X-ray and gramma-wave weapons, earthquakes, scalar or quantum potential weapons. He reviews how these sciences could have been discovered by the late Nikola Tesla in 1908.

According to former Busch Administration Assistant financier Catherine Austin Fitts, such technology in the hands of a “Breakaway Civilization…a group of people who have so much money and so much power…don’t feel under any compunction to obey…any other laws,” would not be afraid to use such invisible weaponry.  (p. 272)

An early start on such technology may have been discovered in the tales of the 1887 Airship Mystery, the Senora Aero Club, and the parent body from Germany: Nymza. The modern Nazi Bell is reminiscent of the Dellschan Airship’s NB gas.

“…what began in the nineteenth century as a secret ‘airship’ program,” says Ferrell, “quickly morphed in the postwar era into a secret space program…the development of technologies that could, to some extent, do double duty, but the vast system of finance to achieve it..”  (p. 310)

Interference and mechanical shutdowns at missile bases about the globe by UFOs seemed to indicate the advanced technology of the (modern progression of) Airship cabal with their directed energy weapons.  Farrell sees some UFOs as a further progression of Nazi ‘fusion’ experiments in Argentina (Dr. Ronald Richter) with lithium-7 fusion reactions, rotating plasmas and zero energy. UFO phenomenon, he says, are in part indications of “a parallel group owing ultimate allegiance to something supranational” in nature.  Ben Rich’s (Lockheed skunkworks scientist) chilling words that we now had the capacity “to take ET home” alluded that someone truly had broken awayand has access to world-altering or shatteringtechnologies as “Unfunded Opportunities.”

Parapsychological Weapons

Farrell further analyzes the use of esoteric, metaphysical, and occultist symbolism by a suspected breakaway and rogue nation. The attackers on 9/11 are, says Farrell, rife with “vast ritual magic and sacrifice on part of an international breakaway group.” He points to scientist Dr. Jacques Vallee who has said that some UFO sightings and some UFO abductions seemed to be “deliberately designed to be a psychotronic technology.”  (pp. 349-350)

(United Kingdom subject Gary McKinnon alleged that he tapped into secret databases of the U.S. military and discovered a vast, and very secret, space fleet program.)

A true breakaway civilization would probably “coordinate psychological operations on a truly celestial, cosmic scale…given the vast survey of a culture whose lust for power of all kinds is virtually boundless…manipulation systems of a planetary scale…as the technological capacity of emulation grows, so too does the scale of finance and secrecy.”  (pp. 357-358)

        PART III        

The third book in this trilogy, Hidden Finance, Rouge Networks, and Secret Sorcery, holds most of the latest and potent ‘clues’ as to the aforementioned Breakaway Civilization. Farrell’s theme centers around the September 11, 2011 attack on the Twin Towers of New York and his compilation of information that, once again, indicates superior events behind this momentous series of happenings pointing at a rogue Power.

Synthetic Terror

Farrell quotes Webster Griffin Tarpley that 9/11 was, in part, “an orchestrated coup d’état, a false flag event of state-sponsored synthetic terror…shock the entire U.S. political system…and the public in general out of their inertia of normal life into a kind of war psychosis and paranoid obsession…”  (p. xvi)

Farrell continues to tie-in his continued comments that a breakaway civilization exploited secret funds, Axis loot, and vast war chests that funded various exotic technologies. He indicates that a Nazi and German International certainly played a part in the 9/11 fiasco, and he goes to great lengths to outline many details.

Links are found in the actions of suspects Mohammed Atta, al-Omaris, as well as Hani Hanjour, hijackers of flight 77. The erratic renting of automobiles, heavy editing of videos, questionable discovery of passports, the peculiar packing of luggage, suicide notes, and curious associations were all factors that opened questions about the hijackers.

Mohammed Atta’s association with Hoffman Aviation flight school melded with all kinds of hidden facts. Rudi Dekkers, the owner of Hoffman Aviation, had a rather criminal past, having been involved in a smuggling operation—including the smuggling of aircraft into the U.S. over the artic, despite radar tracking by American, British and Russian equipment. Atta had previous flight experience and even attended an international officers’ school at Maxwell Air Force Base. Hijackers Abdul al-Omari and Sajed al-Ghandi attended similar military flight training at Brooks Air Base in Texas and the Defense Language Institute in Monterrey, California.  (pp. 22-23)

Carl Duisberg Society

When in America, Atta’s behavior didn’t appear Wahabbi.  His friends attest that he had pilots’ licenses from six nations before Hoffman Aviation. He visited strip-joints, snorted cocaine, smoked marijuana, and has some sort of relationship to the Saudi Royal Family and elite. But, perhaps, the biggest suspicion was his seven years in Hamburg, Germany, and his association with the Carl Duisburg gesellschaft. Bill and Hillary Clinton, David Rockefeller, Henry Kessinger, and Atta Mohammed also worked at the CDS (Atta, as a ‘scholarship holder’ and ‘tutor’ from 1995-1997).

Carl Duisberg was a founder of the infamous I.G. Farben Nazi cartel and war machine. Atta studied German in Cairo, and investigator Jay Kolar speculated that Atta was being groomed as an operative and patsy. Farrell uncovered a doppelganger Mohammed Atta with the same name, involved in a terrorist bombing of a bus in 1986; later, it was discovered that possibly three Moham(m)ed Attas existed (similar to the suspiciously three Lee Harvey Oswalds in the Kennedy assassination).

Level Three

Further suspicious activity involved Venice, Florida police Sergeant Marty Tremor, who confiscated Huffman Aviation’s entire files, carted them into a C-130 cargo plane that headed for Washington.  Jeb Bush was aboard.    

Journalist attest to being told by American intelligence that they were aware months ahead of time about specific targets, dates, time and methods of financing of the 9/11 attacks: all of this had been blocked from public knowledge.  (p. 36)

Farrell speaks of a Level Three conspirator-cabal that manipulated and manufactured the popular hijacking story and the consequential pancake destruction theory of the Twin Towers.

“It was a clever means to divert the publics’ attention away from the incongruities’ and impossibilities of that model,” says Farrell, “and from examining the actual mechanisms of their collapse.” (p.42)

Somebody was leaking vital facts before the actual attacks. Egyptian President Hosni Mubarak was aware and told Washington. As a trained pilot, he also told Washington how impossible it would have been to perform a spiraling descent in which hijacker Hanjour was blamed.

There was Operation Northern Vigilance, as a simulation attack with false radar blips in the air traffic control system. These files had been purged. The Hidden Players also threaten that Air Force One was to be next in the attacks, and showed that they had knowledge of “Top Secret codes.” Apparently, the Pentagon’s five missile defense batteries had been shut down.

Witnesses saw no commercial airlines that approached the Pentagon, but a peculiar aircraft traveling about 500 mph that made a sharp turn, while another was described as a “cruise missile with wings.” Data recordings and Black Boxes simply disappeared. Air Traffic controllers said they saw the aircraft do a strange maneuver on their radar screens, but Flight 77 transponders had been turned off.  False radar blips, however, were part of the Amalgam Virgo drill. A mysterious Flight X at the Cleveland airport at that time, according to researcher Michael Rapaport, showed possible slightofhand tactics.       

The wreckage of Flight 93 was strewn over eight miles, indicating it had been shot down while in flight. There was no debris at the alleged Pentagon crash site. A second smaller white aircraft was witnessed near Flight 93.  One woman said it was a military aircraft.

Farrell outlines the numerous warnings the American national-security-military-intelligence received and apparently let the events unfold without warning the general public, “…the result of a deliberate political decision not to act.”

Hidden Truth of Other Players

The Bush Family, the Bin Ladens and their Carlyle Group, all had intimate links to the CIA. Ultimately, all three were used as patsies, says Farrell, when Level Three Controllers turned their 9/11 plans “inside out.” 

The intimate and intricate intertwining of plots and programs could be seen in the mysterious testimony of Delmart Vreeland who gave a sealed warning with many amazing details of the 9/11 attacks, well before the attacks occurred, possibly indicating Vreeland’s connection to American Naval intelligence. Vreeland indicated that trillions of dollars had been taken out of the United States Treasury, and Vreeland spoke of the Bush’s, the Clintons, and Federal Reserve Chairman Alan Greenspan.

As already mentioned, there appeared to be a Level Three use of ‘doubles.’ Hanjour al-Hazini and al-Mihdhar were in San Diego through the month of August up to September 8, 2001. This is contradicted by sightings on the opposite coast, crossing back to Las Vegas, returning to Baltimore, and spending days in Newark. Likewise, there appeared to be Ziad Jarrah #1 detained in Pakistan and Afghanistan, while Jarrah #2 was in flight school in Venice, Florida. (pp. 124-125)

Farrell says 46 drills existed closely aligned to the 9/11 events, and in the words of researcher Webster Griffin Tarpley, “Terror events were largely camouflaged, assisted, conducted and bootlegged through these drills.”   

Farrell includes the testimony of Dr.Tatyana Koryagana, a Russian economist and rumored member of Russian President Putin’s inner circle, about the existence of a global rouge network…”above and beyond that of al-Qaeda…had access to a financial war chest of approximately $300 trillion”—in which Mohammed Atta appeared to be a member through Carl Duisburg gesellschaft, the notorious I.G. Farben cartel and a postwar Fascist Breakaway Empire.

9/11 Financial Crimes

More than $100 million in illegal transactions appeared to have rushed through the WTC computers before and during the 9/11 disaster, one bank was Deutsche Bank.  Mohammed Atta and many of the 9/11 hijackers had kept accounts with Deutsche Bank. The bin Laden family, as well as the Bush’s and virtually every financial scandal of the postwar world, did probably have some intelligence and underworld criminal masters.” (p. 160)  (Morgan Guaranty Trust, Chase Manhattan, Citibank, Jardine Matheson, UBS, HSBC—and Deutsche Bank.)

This Enterprise, these Leaders, says Farrell, were a polycentric network within and behind corporations and agencies of the Federal government, housing code names, code words, and part of a hidden slush fund’ in the billions to trillions of dollars which would be used to fund highly secret black technologies.

Farrell's Redux Photos ( httpswww.pastemagazine.comarticles201710exclusive-wolfenstein-ii-the-new-colossus-environm.html ) ROW_Wolfenstein II_Area_52_hangar_interior
Secret Black Technologies
https://www.pastemagazine.com/articles/2017/10/exclusive-wolfenstein-ii-the-new-colossus-environm.html

(Researcher Laurent Guye’not points out that Bryan C. Jack, a Pentagon worker responsible for various aspects of accounting for the American defense budget, was on board flight 93.)

The hidden system of finance involved and passed through many significant hands and many powerful banks on a global basis, at the end of the day, this society could hide all trades. All traces, with the use of PROMIS software, everything would become off the record and invisible.

Bringing Down the Towers

The obvious murder weapons used on 9/11 are fairly disputed, says Farrell, and while each ‘theory’ may have contributed to the towers’ demise, the ultimate weapon would appear to be some form of directed energy with electromagnetic beams. Farrell gets into how and when the Planners carried this out.

Farrell's Redux Photos ( httpswww.vaken.sechatta-med-jan-guillou-idag-1530-0905 ) 911-explosion
Directed Energy
https://reactionarytimes.com/2017/06/04/this-is-for-allah-is-terror-the-new-normal/
https://www.vaken.sechatta-med-jan-guillou-idag-1530-0905

Normal explosions and Nano-thermite may have been used by some “planners,” though most devices could not have raised enough temperature to melt massive steel structures. The “ejecta” and plumes indicate something extraordinary was vitalized; as well as the disappearance of approximately 1100 victim bodies. A high percentage of nuclear fusion/fission material, barium, strontium, thorium, uranium, lithium, lanthanum, yttrium, chromium and tritium—and subsequent cancers to victims—indicate sophisticated explosives.  (pp. 195-196)   

It appears, says Farrell, that the Nazis may have experimented with such exotic science in March 1945 at Ohrdruf, Germany with plutonium 239 of extremely high purity, as well as deuterium and tritium to boost yield: chemical laser isotope enrichment technology. Dr. Judy Wood concurred in her book Where Did theTowers Go?  Farrell talks about Masers, interferometry, and approximately 90,000 tons of concrete converted to a homogeneous mixture consisting of sub-100-micron particles of pyroclastic clouds. The clouds appeared to be five times the volume of the amount of the original building. Ferrell says: “Indeed, intergranular melting seems to describe a process where the molecules of steel themselves were exploding internally.” 

Farrell's Redux Photos ( httpswww.disclose.tveuropean-scientific-study-concludes-all-three-wtc-towers-collapsed-due-to-a-controlled-demolition-312113 ) european-scientific-journal-911-wa
Pryoclastic Clouds 
http://www.thetruthseeker.co.uk/?cat=46

The details of the “Planners’” constructed devices are probably questionable, but Farrell believes he is pointing in the correct direction: use of sophisticated phase conjugation in the microwave range of the spectrum with conjugate mirrors of great ability to break down material and recombine it again. Farrell points at unknown space-based components.

Versions of PROMIS software had spread around the globe to numerous defense contractors or networks, financial Criminal Enforcement Network (FinCEN), and the U.S. Treasury.

Mega Rituals      

“The ultimate alchemical wedding of high technology and deep black magic?” asks Ferrell.  “What if it was used to coordinate and plan the details of a Mega Ritual?”

Farrell sees a gigantic working of ritual magic behind the 9/11 scenes: the Twin Towers as the twin Masonic pillars of Jachin and Boaz, quoting researcher Peter Levenda, and the events as a massive magical ritual of human sacrifice and technology in the form of exotic means of destruction of the Twin Towers.   

Peter Lavenda is quoted about C.G. Jung’s meaningful coincidences as if some “subconscious Group…Mind of the Masses” was at work. Farrell quotes author S.K. Bain who listed a broad range of psychological warfare, occult symbols, esoteric elements, Egyptian gods, Pillar of Hercules, the Veil of Isis, and many structural symbols and constructs and signatures: The Sixteenth Greater Trump of the Tarot Tower, the twin towers of Deutsche Bank in Frankfort, plus several others: all indicate a deeper blackest of the Black Magic.

(President G. W. Bush’s reading of the story at Booker Elementary School, “My Pet Goat,” symbolized Baphomet, the sacred androgyny god Pam.)

Russian economist Dr. Tatyana Koryagina spoke of this Network having access to over $300 trillion, placing it outside of any merely American lower level intelligence.

Jingoistic Plastic Patriotism

Farrell says that America, since 9/11, has taken on an increasingly brutal fascist culture, a kind of jingoisticplastic patriotism. He speaks of a global network of “finance of terrorism…technological sophisticated cyber warfare to exotic weapons of destruction…resulting in the sacrifice of innocent lives for ultimate evil.”

“Money, power, occult knowledge, exotic technology, and financing in the trillions of dollars,” says Farrell, “do signify…a much deeper player, a player with an unrecognizable center of power, a player everywhere and nowhere…”  (p262)

Photos Extra Nazi Wing ( httpwww.darkroastedblend.com200904wonder-weapons-of-world-war-two.html ) truketyjtrhdgbf
An Unrecognized Center of Power
http://www.darkroastedblend.com/2009/04/wonder-weapons-of-world-war-two.html
*******

Farrell owes much credit to numerous researchers that are cited throughout his books: Webster Griffin Tarpley, Thierry Meyssan, Jay Kolar, Daniel Hopsicker, Nafeez Mossaddeg, David Ray Griffin Michael Ruppert, E.P. Heidner, Mark H. Gaffney, Eric Hufschmid, Laurent Guyenit, Jim Hoffman and Bonnie Faulkner, Rodney Stich, Peter Lavenda, S.K. Bain, Peter Dale Scott, Gladio Cottrell, John O’Neill, Catherine Austin Fitts,  Michael Busby, Dennis Crenshaw, Richard M. Dolan, Ross Bellant, Martin A. Lee, Jim Marrs, Henry Stevens, Rich C. Hoagland, Anthony Sutton, Dr. Judy Wood, and several other dedicated authors.

Erdmann is prohibited from giving more detailed facts from Farrell’s books, which the public will relish in their own reading, hopefully inducing them to expand and increase their study.

*******
You can reach Steve Erdmann – at dissenterdisinter@yahoo.com or independenterdmann@gmail.com.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can friend him at:
Facebook – https://www.facebook.com/stephen.erdmann1 –
Or – visit the Dissenter/Disinter Group –https://www.facebook.com/#!/groups/171577496293504/.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can also visit his articles at the following:
http://www.minds.com,
http://www.ufospotlightwordpress.com,
http://www.ufodigestblog.wordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/,
https://www.facebook.com/TheUniversalDigest/?__tn__=%2Cd%2CP-R&eid=ARB3i9eJwirzOvkPMA5RwMhIUX-3xSP69ME1YHZhQjeSqnxoiNgzhKt1WVX8EUlupUgLBVzd_mX-VXAN
*******
Photos Extra Steve1 34934490_10156520897824595_8244253719684710400_n
Steve Erdmann – Independent Investigative Journalist

Another version of this article can also be seen at Joseph Farrell’s Nazi Trilogy Redux – https://wordpresscom507.wordpress.com/2020/06/07/

Recent Posts

Archives

The World of Pedophilia Exposed

https://wordpresscom507.wordpress.com/2020/12/09/the-infamous-world-of-child-scandal/

The Infamous World of Child Scandal

Posted on  by steveerdmann

Another version of this article can be seen at The Infamous World of Child Scandal – https://wordpresscom507.wordpress.com/2020/06/07/

The_Hidden_World

Omar Faizi

Omar Faizi with Amy Paugh

**********

I Called Everyone in Jeffrey Epstein’s Little Black Book

Click the highlighted text for more. Jeffrey Epstein’s little black book is one of the most cursed documents ever compiled in this miserable, dying country. Totaling 97 pages and containing the names, numbers, and addresses of a considerable cross section of the global elite, Epstein’s personal contact book first turned up in a courtroom in … Continue readingI Called Everyone in Jeffrey Epstein’s Little Black Book

**********

**********

**********

**********

“Women and possibly even children lured into the program were then convinced to sign up for a more ‘advanced program’ called Dominus Obsequious Sororium, which required them to basically turn their lives over to the leader, Raniere. Dominus Obsequious Sororium is a quasi-Latin phrase that roughly translates to ‘Master Over The Slave Women.’ In this case, sex slaves.”

Above quote from the below article:

https://www.collective-evolution.com/2020/08/13/the-billionaire-bronfman-family-implicated-in-nxivms-hollywood-sex-cult/?fbclid=IwAR3_rCNG0lNWBmiJVKWiwSRZPLfFXhKdhsY6-IpP44q4EW8WSf5hlh49J5w

**********
Hollywood's dark secrets.
“These stories fit a pattern, and not just the pattern common to all sex crimes allegations — the shame, the gas-lighting, the fear you won’t be believed — but also the pattern common to testimonies about a systemic problem: the coordination, the law of silence, the coverups.
“And just as striking as these allegations is the deafening silence that surrounds them.”
The above quote from the below article:
https://theweek.com/articles/731375/hollywood-sitting-pedophilia-scandal
**********
PEGGY MCMARTIN BUCKEY AND HER SON RAY BUCKEY DURING THEIR TRIAL IN 1987. THEY WERE ACCUSED OF SATANIC CHILD ABUSE BUT EVENTUALLY ACQUITTED IN WHAT BECAME THE MOST EXPENSIVE CRIMINAL TRIAL IN US HISTORY. 
“Pedophilia is a real threat. Officials have caught large-scale pedophile rings far more often than one might think, and some of them have involved famous individuals and cover-ups. To many, it is a uniquely evil crime; someone who sexually abuses a child seems capable of anything. But fear of pedophiles can be weaponized and used to whip up mobs that don’t want to wait for solid evidence of wrongdoings to emerge, lest unspeakable horrors go unchecked. In many ways, it is an ideal tool for mobilizing small but highly vocal pockets of opposition against one’s enemies, as it can co-opt some people with genuine fears about child trafficking into perpetuating smear and harassment campaigns. It also offers those who are already predisposed to believing terrible things about the accused more license to hate. Accusations of pedophilia are often taken extremely seriously by law enforcement as well: In 2014, for instance, British police launched a multimillion-dollar investigation into a number of individuals, some of them national politicians, based on one man’s accusations, which turned out to be utterly baseless.”
Above quote from the below article:
https://www.vice.com/en_us/article/59vgwa/the-strange-centuries-long-history-of-satanic-pedophile-panics
**********
dark-web-pedophilia
“The study could nonetheless lead to difficult questions for the Tor support community. And it could also dramatically shift the larger public conversation around the Dark Web. Law enforcement officials and politicians including New York Senator Chuck Schumer have railed against the use of Tor to enable online drug sales on a mass scale, with little mention of child abuse. “
The above quote from the below article:
https://www.wired.com/2014/12/80-percent-dark-web-visits-relate-pedophilia-study-finds/
**********
air_loom
“I do believe there is an occult or metaphysical system of control that affects us all,” Keel said. “The exact nature and purpose of this system is probably indefinable and definitely incomprehensible. To simplify everything in a few words: The intelligence behind this system of control doesn’t give a shit about individual human beings.”
***
“Both of those possibilities are eerie.  By one account, Shaver during his wandering years was arrested for vagrancy, but the hallucination of a beautiful woman that he had been experiencing also appeared to a jail guard who was persuaded to release Shaver.  Are shared delusions that powerful?  Somewhere between psychedelic drug effects, hypnosis, and very good storytelling could lie a kind of magic power to conjure hallucinations in another person’s mind. Yet make them so indelible that they stay there.
“Us creative people worry about this sort of thing.  It’s a power that’s fun to play with for about five minutes until, Sorcerer’s Apprentice, it gets out of control.  Maybe it was never under our control to begin with.”
Above quote from the below article:
https://geekydomain.com/the-shaver-mystery-an-account-of-congruent-insanity/

**********

evidence-operation-blackwrist-interpol.jpg
“The Australian Associated Press reported that Tokputza, 31, pleaded guilty to 50 counts of abuse of 11 babies and children — one just 15 months old — between 2011 and 2018.
“‘You are a child’s worst nightmare, you are every parent’s horror, you are a menace to the community,’ Judge Liesl Chapman said in Adelaide.”
Above quote from the below article:
https://www.cbsnews.com/news/pedophilia-ring-dark-web-interpol-operation-blackwrist-thailand-us-australia-children-rescued/
**********
“There is a deep and hidden place on the Internet in which all the horror of our planet, all the atrocities of the world, all the evil that the mind can ever conceive, and all the possible wickedness of the human being is just a click away.”
The above quote is from the below article:
https://www.lavocedinewyork.com/en/news/2020/07/18/paying-to-watch-the-torture-and-death-of-a-child-online-the-hell-of-the-deep-web/?fbclid=IwAR2GMWTrC2C-KPCTAKQXA75T1oKNaF36xnsXml9KkBnQCUB9hFAHFD5q0XA
**********
**********
**********
Those wishing to reach Steve Erdmann can reach him at dissenterdisinter@yahoo.com or independenterdmann@gmail.com or through the editor of these magazines.  He also has a Facebook Magazine at http://www.facebook.com/#!/stephen.erdmann1
You can also visit his articles at:
mewe.com/i/stephenerdmann1
http://www.minds.com – TheDissenter,
http://www.ufospotlightwordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/,
https://www.facebook.com/TheUniversalDigest/?__tn__=%2Cd%2CP-R&eid=ARB3i9eJwirzOvkPMA5RwMhIUX-3xSP69ME1YHZhQjeSqnxoiNgzhKt1WVX8EUlupUgLBVzd_mX-VXAN
Steve Erdmann – Independent Investigative Journalist

Ultimate UFO Realities

Tricks of the Mind

Another version of this article can be seen at The Infamous World of Child Scandal – https://wordpresscom507.wordpress.com/2020/06/07/